The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet- filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.
A. Transport layer
B. Physical layer
C. Data Link layer
D. Network layer
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?
A. AES
B. SHA
C. EAP
D. CRC32
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
A. Storage Area network
B. Off-site storage
C. On-site storage
D. Network attached storage
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.
A. Blowfish
B. DES
C. IDEA
D. RC4
In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?
A. Chosen plaintext attack
B. Ciphertext only attack
C. Chosen ciphertext attack
D. Known plaintext attack
Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.
A. Strikes
B. Floods
C. Accidents
D. Storms
Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.
A. A foreign key
B. A private key
C. A public key
D. A primary key
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
A. Eradication phase
B. Recovery phase
C. Containment phase
D. Preparation phase
E. Identification phase
You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use?
A. Hub
B. Repeater
C. Bridge
D. Switch
E. Router
Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?
A. Detective access control
B. Physical access control
C. Technical access control
D. Administrative access control