Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
A. CHAP
B. PEAP
C. EAP
D. EAP-TLS
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.
A. Estimate the potential losses to assets by determining their value.
B. Establish the threats likelihood and regularity.
C. Valuations of the critical assets in hard costs.
D. Evaluate potential threats to the assets.
Which of the following should the administrator ensure during the test of a disaster recovery plan?
A. Ensure that the plan works properly
B. Ensure that all the servers in the organization are shut down.
C. Ensure that each member of the disaster recovery team is aware of their responsibility.
D. Ensure that all client computers in the organization are shut down.
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
A. Pairwise Transient Key
B. Group Temporal Key
C. Private Key
D. Pairwise Master Key
You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?
A. Administrative access control
B. Logical access control
C. Physical access control
D. Preventive access control
You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is
not enough and want to have employees use tokens for authentication.
Which of the following is not an example of tokens?
A. Smart card
B. USB device with cryptographic data
C. CHAP
D. Key fob
Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.
A. Routers
B. MAC addresses
C. Firewalls
D. Hub
Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?
A. OFB mode
B. CFB mode
C. CBC mode
D. PCBC mode
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
A. Block cipher
B. Stream cipher
C. Transposition cipher
D. Message Authentication Code
Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?
A. Sherwood Applied Business Security Architecture
B. Service-oriented modeling and architecture
C. Enterprise architecture
D. Service-oriented architecture