- Restricting Bluetooth device discovery relies on the secrecy of what?
(a) MAC address
(b) Symmetric key
(c) Private key
(d) Public key - What are the names of the OSI model layers in order from bottom to top?
(a) Physical, Data Link, Transport, Network, Session, Presentation, Application
(b) Physical, Network, Data Link, Transport, Session, Presentation, Application
(c) Physical, Data Link, Network, Transport, Session, Presentation, Application
(d) Physical, Data Link, Network, Transport, Presentation, Session, Application - What is the most secure type of EAP?
(a) EAP-TLS
(b) EAP-TTLS
(c) LEAP
(d) PEAP - What is the most secure type of firewall?
(a) Packet filter
(b) Stateful firewall
(c) Circuit-level proxy firewall
(d) Application-layer proxy firewall - Accessing an IPv6 network via an IPv4 network is called what?
(a) CIDR
(b) NAT
(c) Translation
(d) Tunnelling
Answers in comments
Q1: (a) MAC address
Q2: (c) Physical, Data Link, Network, Transport, Session, Presentation, Application (“Please Do Not Throw Sausage Pizza Away”)
Q3: (a) EAP-TLS (it requires both server-side & client-side certificates)
Q4: (d) Application-layer proxy firewall (the most secure because it has the ability to filter based on Layers 3-7)
Q5: (d) Tunnelling (translation is a distractor answer)
LikeLike