1. To reduce the possibility of security break-ins from unauthorized users, which should be implemented? A. Packet sniffers B. Firewall C. Port scanners D. Intrusion detection system
4. Which IP address should you deny into your internetwork? A. 126.10.10.0/8 B. 168.0.0.0/8 C. 128.0.0.0/8 D. 127.0.0.0/8
5. Which of the following is a tunneling protocol? A. Layer 2 Tunneling Protocol (L2TP) B. Internet Protocol Security (IPSec) C. Secure Sockets Layer (SSL) D. All of the above
6. Which tunneling protocol is based on RSA public-key encryption? A. SSL B. L2TP C. IPSec D. SSL VPN
7. What is the minimum number of characters you should use when creating a secure password? A. 6 B. 7 C. 8 D. 15
8. Which layer of the OSI model does IPSec operate in? A. Physical B. Network C. Transport D. Application
9. Which protocol works in both the transport mode and tunneling mode? A. SSL B. L2TP C. PPTP D. IPSec
10. Companies that want to ensure that their data is secure during transit should use which of the following? A. Firewalls B. Encryption C. Data accounting D. Routing table
11. Which network utilities do not have the ability to encrypt passwords? (Select two.) A. FTP B. SSH C. Telnet D. SCP
12. To encode or read an encrypted message, what tool is necessary? A. Routing table B. Internet access C. Encryption key D. Email address
14. Which of the following is not a type of public-key encryption? A. Diffie-Hellman algorithm B. RSA Data Security C. Pretty Good Privacy (PGP) D. DES
15. Which of the following VPN protocols runs over port 1723, allows encryption to be done at the data level, and allows secure access? A. RAS B. Radius C. PPPoE D. PPTP
16. At which stage of PPPoE are the MAC addresses of each of the endpoints of the connection given to each other so that a PPP connection can be made? A. Session B. Discovery C. Transport D. Final
17. When utilizing multifactor authentication, which of the following is an example of verifying something you are? A. Smart card B. Password C. Fingerprint D. Certificate
18. Which of the following authentication methods allows for domain authentication on both wired and wireless networks? A. RADIUS B. TACACS+ C. PKI D. RDP
19. Which user-client-server authentication software system combines user authentication and authorization into one central database and maintains user profiles? A. RADIUS B. TACACS+ C. Kerberos D. PKI
20. Which of the following is not a Network Access Control method? A. CHAP B. 802.1x C. EAP D. ICA