Which of the following types of firewalls looks deep into packets and makes granular access control decisions?
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?
The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?
Each correct answer represents a complete solution. Choose two.
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?
Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.
Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits?
Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?