- (Topic 8)
Which is the Novell Netware Packet signature level used to sign all packets ?
Correct Answer:D
Level 0 is no signature, Level 3 is communication using signature only.
- (Topic 4)
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
Correct Answer:C
- (Topic 4)
What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?
Correct Answer:B
- (Topic 7)
A POP3 client contacts the POP3 server:
Correct Answer:B
POP is used to receive e-mail. SMTP is used to send e-mail.
- (Topic 4)
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?
Correct Answer:D
- (Topic 3)
June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?
Correct Answer:C