1.
An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol is the most likely able to handle this requirement?
2.
What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities? What kind of Web application vulnerability likely exists in their software?
3.
During the process of encryption and decryption, what keys are shared?
4.
How does the Address Resolution Protocol (ARP) work?
5.
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
6.
What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?
7.
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?
8.
You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
9.
If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?
10.
By using a smart card and pin, you are using a two-factor authentication that satisfies