Information Technology Reference
In-Depth Information
7.
Authentication of the identity is based on what attributes? (Select all that apply.)
a.
Something the subject knows
b.
Something the subject has
c.
Something the subject is
d.
All of the above
8. What VPN protocol uses encrypted point-to-point GRE tunnels?
a.
GRE-based VPN
b.
Cisco Easy VPN
c.
Cisco GET VPN
d.
Cisco DMVPN
9. What are some physical security guidelines to consider for a secure infrastructure?
(Select all that apply.)
a.
Evaluate potential security breaches
b.
Use physical access controls such as locks or alarms
c.
Assess the impact of stolen network resources and equipment
d.
Syslog and SNMP analysis
10. Which of the following benefits does a security management solution provide?
a.
SAINT scans
b.
Provisions network security policies for deployment
c.
Prevents unauthorized access
d.
NMAP scans
Search WWH ::




Custom Search