Which of the following needs to be documented to preserve evidences for presentation in court?
A. Incident response policy
B. Separation of duties
C. Chain of custody
D. Account lockout policy
Which of the following components come under the physical layer of the OSI model? Each correct answer represents a complete solution. Choose all that apply.
A. Wall jacks
B. Hubs
C. Switches
D. Fiber cabling
E. RJ-45 connectors
Which of the following is a program that monitors data packets traveling across a network?
A. Sniffer
B. Smurf
C. Hacker
D. BitLocker
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?
A. HTTP
B. FTP
C. Firewall
D. Gopher
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
A. FTP server
B. VPN
C. Certificate server
D. Microsoft Internet Information Server (IIS)
Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
A. RADIUS
B. TACACS+
C. Peer-to-Peer
D. Media Access control
Routers and firewalls use _______ to determine which packets should be forwarded or dropped.
A. Encryption
B. Security audit log
C. Access control list
D. Ciphering
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
A. Screened host
B. Demilitarized zone (DMZ)
C. Bastion host
D. Honey pot
Which of the following are tunneling protocols?
Each correct answer represents a complete solution. Choose two.
A. SMTP
B. NNTP
C. L2TP
D. PPTP
You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?
A. Implement a proxy server on the network.
B. Implement firewall on the network.
C. Connect a router to the network.
D. Connect a brouter to the network.