Which of the following is an UDP based protocol?
Correct Answer:B
Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.
This style of defense-in-depth protection is best described as which of the following?
Correct Answer:B
Which of the following is a type of countermeasure that can be deployed to ensure that a threat vector does not meet a vulnerability?
Correct Answer:A
You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:
* they contain only numerals
* they contain only letters
* they contain only special characters
* they contain only letters and numerals
" they contain only letters and special characters
* they contain only numerals and special characters
Of the following, what is the benefit to using this set of tests?
Correct Answer:B
To be considered a strong algorithm, an encryption algorithm must be which of the following?
Correct Answer:B
What is the most secure way to address an unused Windows service so it cannot be exploited by malware?
Correct Answer:D