You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:
l Provide security for the web traffic.
l Browser clients can support the VPN connection to a host.
Which of the following will you configure to implement the given features in the network?
Which of the following techniques correlates information found on multiple hard drives?
John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication. Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?
Which of the following tools is used to detect spam email without checking the content?
The stateful firewalls combine the significant flows into conversations. Which of the following properties is used to classify a flow?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?
Which of the following tools detects certain types of packet filters and NAT setups?
Fill in the blank with the appropriate tool name.
______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
John works as the Security Manager in PassGuide Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds. Which of the following rulebases is used for this purpose?