Sample Questions
Q) Which of the following authentication performs and provides a secure connection using 3DES to encrypt the information between the two systems?
a) HTTPS
b) SSH
c) RSA
d) SSL
e) None
Q) Some users have reported problems connecting to laptops. With further study, identifies the network technology that their laptops were attacked with a certain IP-addresses outside the network. Which of the following would need to be set up to prevent further attacks from the IP-address?
a) port security
b) IDS
c) firewall rules
d) VLAN assignment switch
e) None
Q) The company has created a new web site that will require a lot of interaction with external users. The site should be accessible both inside and outside, without access to internal resources. Which of the following is most likely to be set up on the firewall?
a) PAT
b) DHCP
c) DMZ
d) NAT
e) None
Q) Which of these attacks allow an attacker to do port forwarding on the internal server of the company from a single server in the Internet?
a) SYN flood
b) a tear
c) Smurf
d) FTP bounce
e) None