Which of the following is used in conjunction with smoke detectors and fire alarm systems to improve and increase public safety?
A. Gaseous fire suppression
B. Gaseous emission system
C. Fire sprinkler
D. Fire suppression system
Which of the following is a method of authentication that uses physical characteristics?
A. COMSEC
B. ACL
C. Honeypot
D. Biometrics
Which of the following protocols is used for E-mail?
A. TELNET
B. MIME
C. SSH
D. SMTP
Which of the following is a network analysis tool that sends packets with nontraditional IP stack parameters?
A. Nessus
B. COPS
C. SAINT
D. HPing
Which of the following is a communication protocol multicasts messages and information of all the member IP multicast group?
A. IGMP
B. ICMP
C. BGP
D. None
E. EGP
You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.
A. WEP encryption
B. WPA encryption
C. Not broadcasting the SSID
D. The MAC-filtering router
Which of the following offer "always-on" Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.
A. analog modem
B. digital modem
C. DSL
D. cable modem
Which of the following is a management process that provides a framework for promoting quick recovery and the capability for an effective response to protect the interests of its brand, reputation, and stakeholders?
A. Log analysis
B. Incident handling
C. Business Continuity Management
D. Patch management
John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.
A. Mitigation, Security policies
B. Verification, Security Policies
C. Vulnerability scanning, Risk Analysis
D. Risk analysis, Risk matrix
Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
A. It uses a longer subnet masks as those used for IPv4.
B. The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.
C. It provides enhanced authentication and security.
D. It uses 128-bit addresses.
E. It's more of available IP addresses.