- (Topic 3)
Your company uses Cisco routers exclusively throughout the network. After securing the
routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?
Correct Answer:B
- (Topic 1)
Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11 standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for every ____ .
Correct Answer:B
- (Topic 1)
File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7?
Correct Answer:B
- (Topic 3)
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment?
Correct Answer:B
- (Topic 3)
When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?
Correct Answer:C
- (Topic 3)
When cataloging digital evidence, the primary goal is to
Correct Answer:B