1. A VPN typically provides a remote access link from one host to another over:
A. an intranet.
B. a modem.
C. a network interface card.
D. the Internet. 1k0-002
Answer: D
2. IPSec uses which of the following protocols to provide traffic security? (Select TWO).
A. SSH
B. AH
C. PPTP
D. SSL
E. L2TP
F. Encapsulating Security Protocol (ESP) 9l0-509
Answer: BF
3. The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:
A. communications are a drain on bandwidth.
B. communications are open and unprotected.
C. has no common protocol.
D. uses weak encryption. a00-212
Answer: B
4. Which of the following would be BEST to do when network file sharing is needed? (Select TWO).
A. Allow read permissions only for unauthenticated users.
B. Create local users who have no access to the shares.
C. Allow access to administrators only.
D. Place the share on a different volume than the operating system.
E. Set a disk quota. e20-520
Answer: DE
5. Which of the following programming techniques should be used to prevent buffer overflow attacks?
A. Input validation
B. Nested loops
C. Signed applets
D. Automatic updates 1z0-043
Answer:A
Monday, October 13, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment