Sample Questions
Q) A chronology of the value of three half passwords which of the following?
a) Three different passwords are used before they can be reused.
b) The password can not be reused once changed for three years.
c) After three hours, the password must be re-entered to continue.
d) The server stores the passwords in the database for three days.
Q) In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following safety technology could be used to provide remote access? (Select two).
a) subnetting
b) NAT
c) Firewall
d) NAC
d) VPN
Q) Which of the following devices is best suited for servers that need to store private keys?
a) hardware security module
b) Hardened by network firewall
c) solid state disk
d) Hardened host firewall
Q) All of the following are valid cryptographic hash functions except:
a) RIPEMD
b) RC4.
c) SHA-512
d) SHA-512
Q) After verifying that the server and the database are running, Jane, the administrator is still able to establish a TCP connection to the database. Which of the following is the most likely cause of this?
a) The server has enabled DEP
b) The server has a TPM-based security enabled
c) The server is installed HIDS
d) The server is running a host-based firewall