Information Technology Reference
In-Depth Information
18. What are the four steps used to facilitate continuing efforts in maintaining security
policies?
a.
Secure, monitor, maintain, close out
b.
Monitor, test, evaluate, purchase
c.
Improve, test, purchase, evaluate
d.
Secure, monitor, test, improve
19. Match the encryption keys and VPN protocols with their definitions.
i.
IPsec
ii.
SSL
iii.
Shared secret
iv.
PKI
a.
Both sides use the same key.
b.
Uses AH and ESP.
c.
We b b r o w s e r T C P p o r t 4 4 3 .
d.
Asymmetric cryptography.
20. What does Cisco recommend as the foundation of any deployed security solution?
a.
Customer requirements
b.
Security audit
c.
SLA policy
d.
Security policy
21. Which two of the following protocols are used for IP security?
a.
SSH and EIGRP
b.
BGP and TCP
c.
AH and ESP
d.
SSH and RIP
Search WWH ::




Custom Search