Which of the following statements about certification authority (CA) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
Which of the following statements about Secure Sockets Layer (SSL) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following protocols work at the session layer of the OSI model?
Each correct answer represents a complete solution. Choose two.
Which of the following is a reason to implement security logging on a DNS server?
Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?
Which of the following authentication methods is used to access public areas of a Web site?