1.
Look at the following items, which one usually applies specifically to a web browser?
2.
One type of port scan can determine which ports are in a listening state on the network, and can then perform a two way handshake. Which type of port scan can perform this set of actions?
3.
Which one of the following options will allow for a network to remain operational after a T1 failure?
4.
Which of the following has largely replaced SLIP?
5.
You work as the network administrator at Certkiller .com. The Certkiller .com network uses the RBAC (Role Based Access Control) model. You must plan the security strategy for users to access resources on the Certkiller .com network. The types of resources you must control access to are mailboxes, and files and printers. Certkiller .com is divided into distinct departments and functions named Finance, Sales, Research and Development, and Production respectively. Each user has its own workstation, and accesses resources based on the department wherein he/she works. You must determine which roles to create to support the RBAC (Role Based Access Control) model. Which of the following roles should you create?
6.
In cryptography, a pre-shared key or PSK is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used. Pre-shared keys can be applied to which of the following?
7.
Which of the following definitions fit correctly to RADIUS?
8.
Which description is correct about a tool used by organizations to verify whether or not a staff member has been involved in malicious activity?
9.
Which of the following definitions fit correctly to TACACS?
10.
Which access control method gives the owner control over providing permissions?