Sample Questions
Q) Which of the following MOST Prevents methods of detection of network?
a) MIME encoding
b) SSL
c) FTP
d) email accounts Anonymous
e) None
Q) Joe, a network security engineer, has a visibility of network traffic using network monitoring tools. But he is concerned that a disgruntled employee can send the server containing the companyâ ¢ â, ¬ Ys financial performance. Which of the following security mechanisms would be most appropriate to confirm Joeà ¢ â, ¬ Ys suspicion?
a) HIDS
b) HIPS
c) NIPS
d) NDI
e) None
Q) Which of the following can be used to maintain a high level of safety in the SAN, enabling isolation of incorrect configurations or incorrect?
a) VLAN
b) security protocol
c) port security
d) VSAN network
e) None
Q) The company must receive the data containing personal information. The company requires a data transmission and at rest, to be encrypted. Which of the following to achieve this goal? (Choose two).
a) SSH
b) TFTP
c) NTLM
d) TKIP
e) SMTP