- (Topic 2)
Mark is implementing security on his e-commerce site. He wants to ensure that a customer
sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?
Correct Answer:D
- (Topic 1)
Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.
Correct Answer:BC
- (Topic 1)
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
Correct Answer:B
- (Topic 2)
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:
* 1. Encryption should be used for authentication of all traffic to the Web site.
* 2. SSL should not be used on the Web server for performance reasons.
* 3. Users should be authenticated using their Active Directory credentials.
In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?
Correct Answer:CD
- (Topic 3)
Which of the following wireless security features provides the best wireless security mechanism?
Correct Answer:A
- (Topic 2)
Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.
Correct Answer:ABD