Selasa, 11 Januari 2011

kunci cisco chapter 16 essentials (4.0)

Which method of encryption provides secure tunnels?
asymmetric encryption
hash encoding
symmetric encryption
//VPN

Which feature must be enabled to monitor network activity within Windows XP?
hash encoding
//logging and auditing
password protection
symmetric encryption

Which item is kept secret in symmetric encryption?
the mathematical function
//the encryption key
the event log files
the message digest

Which device is used to ensure secure credit card payments?
card key
conduit
security key fob
//smart card
Which security device communicates with the computer over a short range?
biometric device
conduit
//security key fob
smart card

Which solution, when deployed on a network, looks for policy matches via the use of IP addresses and port numbers?
dual-homed gateway
//packet filter firewall
proxy firewall
stateful inspection firewall
Which security element operates independently of computer resources?
antispyware program
antivirus program
//hardware firewall
software firewall

A network administrator disabled SSID transmission in a wireless network that is equipped with WPA. However, an attacker managed to penetrate the network. The administrator then deployed a wireless security configuration tool to restrict access to listed clients. Which tool did the network administrator install?
//MAC address filtering
WEP
wireless antenna
packet filtering

What is a feature of restrictive security policy?
//It enables a specific list of ports, and only packets entering through those ports are permitted.
It is applied as a default setting to all hardware and software components that are installed on the network.
It limits the number of users who can access the network.
It permits access through all ports except those that are explicitly denied.

When Windows Update is being configured on a computer with Windows XP, which option can conflict with the security policy of an organization?
//Automatic updates
Download updates
Notify me
Turn off automatic updates

A vendor needs to work in the company office for two weeks. Which type of account should be created for the vendor?
//a guest account along with partial access to the network
a new account that gives the same privileges as company employees have
a re-enabled account of a former employee
a temporary account along with full access to the network

Which backup method will always ensure that the restored data is complete and secure, even if it is used on its own, without any other form of backup?
daily backup
differential backup
incremental backup
//normal backup

While gathering data to troubleshoot a problem with a computer, the technician asked various questions. Which question is a closed-ended question?
//Has the password been changed recently?
When did the problem start?
What type of firewall is being used?
What types of backups were used to back up the data on the computer over the last month?

Which software application monitors and reports the changes in program code?
an application that protects the computer from adware
a patch to an application
a firewall application
//IDS
Which encryption technology uses the SHA and MD5 algorithms?
asymmetric encryption
//hash encoding
symmetric encryption
VPN

Which action provides superior protection for a wireless network?
configuring WEP with 32-bit encryption
//configuring WPA
disabling MAC address filtering
retaining the default SSID

Why is the Notify me Windows update option more suitable for dial-up connections?
//It allows the user to control the update to prevent interruption of other network activity.
It automatically downloads updates and notifies the user to install them later.
It automatically installs updates when the user is not working on the computer.
It prevents checking for updates.

Which two sources can provide a technician with possible solutions for various types of network-related problems? (Choose two.)
paperwork provided to customers
//manufacturer FAQ for network devices
firewall logs
network device logs
//technical websites

After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in. Later, the user rebooted the computer and was able to log in. Which step did the technician omit during the troubleshooting process?
closing the issue with the customer
gathering data from the computer
gathering information from the user
//trying quick solutions

What is the purpose of using hash encoding?
ensures complete security of the message digest
ensures that the message digest remains the same even if the data is tampered with
//ensures that tampering with data is detectable
regenerates the message digest when the original message digest is changed

0 komentar:

Posting Komentar

Template by:

Free Blog Templates