1.
Which of the following network design elements will allow Jane, a security technician, to access internal company resources without the use of a DS3, Satellite, or T1 connection?
2.
Which of the following utilizes the ECHO function of Internet Control Message Protocol (ICMP) to overwhelm a victim's system?
3.
Matt, an administrator, is concerned about the wireless network being discovered by war driving. Which of the following can be done to mitigate this?
4.
Jane, the administrator of a small company, wishes to track people who access the secured server room, which is secured only by a simple hardware key lock.

Jane does not have much of a budget or the approval to make significant construction changes. Given the limitations, which of the following can she do in the
meantime?
5.
Which of the following enterprise security controls is BEST implemented by the use of a RADIUS server?
6.
Pete, the security administrator at a financial institution, has finished downloading a new system patch and needs to verify its authenticity. Which of the following is
the correct MD5 string for the file he downloaded?
7.
One of the advantages of Trusted Platform Modules (TPM) is:
8.
Which of the following protocols is MOST closely linked with SSL?
9.
Which of the following would Jane, an administrator, use to detect an unknown security vulnerability?
10.
Which of the following data center environmental controls must be property configured to prevent equipment failure from water?