1.
Which of the following statements regarding the MAC access control models is TRUE?
2.
Which statement best describes a static NAT?
3.
Which of the following would be MOST desirable when attacking encrypted data?
4.
Which scanner can find a rootkit?
5.
What is steganography primarily used for?
6.
Which of the following is the MOST effective way for an administrator to determine what security holes reside on a network?
7.
For the following sites, which one has the means (e.g. equipment, software, and communications) to facilitate a full recovery within minutes?
8.
A company has instituted a VPN to allow remote users to connect to the office. As timecprogresses multiple security associations are created with each association being more secure. Which of the following should be implemented to automate the selection of the BEST security association for each user?
9.
Which item is not a logical access control method?
10.
The concept that a web script is run in its own environment and cannot interfere with any other process is known as a: