Tough Questions 201-210

_______________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints. (a) ISDN(b) Frame Relay(c) SMDS(d) ATM Answer:(b) Explanation:Frame Relay is a layer 2 connection mechanism that uses packet-switching technology or establishes virtual circuits between the communication endpoints. The Frame Relay network is a shared medium across which virtual circuitsContinue reading “Tough Questions 201-210”

Exam Essentials: Chapter 14

Chapter 14: Controlling & Monitoring Access Identify common authorisation mechanisms Authorisation ensures that the requested activity or object access is possible, given the privileges assigned to the authenticated activity. For example, it ensures that users with appropriate privileges can access files & other resources. Common authorisation mechanisms include: implicit deny access control lists access controlContinue reading “Exam Essentials: Chapter 14”

Exam Essentials: Chapter 13

Chapter 13: Managing Identity & Authentication Know the difference between subjects & objects Subjects are active entities (such as users) that access passive objects (such as files) A user is a subject who accesses objects while performing some action or accomplishing a work task. Know the various types of access controls You should be ableContinue reading “Exam Essentials: Chapter 13”

Exam Essentials: Chapter 12

Chapter 12: Secure Communications & Network Attacks Understand the issues around remote access security management Remote access security management requires that security system designers address the hardware & software components of an implementation along with issues relating to policy, work tasks & encryption. Be familiar with the various protocols and mechanisms that may be usedContinue reading “Exam Essentials: Chapter 12”

Tough Questions 191-200

Which of the following is least resistant to EMI? (a) Thinnet(b) UTP(c) STP(d) Fibre Answer:(b)  Which networking technology is based on the 802.3 standard? (a) Ethernet(b) Token Ring(c) FDDI(d) HDLC Answer:(a)  What is both a benefit and a potentially harmful implication of multi-layer protocols? (a) Throughput(b) Encapsulation(c) Hash integrity checking(d) Logical addressing Answer:(b)  By examining the source & destination addresses, theContinue reading “Tough Questions 191-200”

Exam Essentials: Chapter 11

Chapter 11: Secure Network Architecture & Securing Network Components Know the OSI model layers and which protocols are found in each The seven layers, and the protocols supported by each, are as follows: Application: HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC and SET Presentation: Encryption protocols & format types, suchContinue reading “Exam Essentials: Chapter 11”

Tough Questions 181-190

You have three applications running on a single-core, single-processor system that supports multitasking. One of those applications is a word processing program that is managing two threads simultaneously. The other two applications are using only one thread of execution. How many application threads are running on the processor at any given time? (a) One(b) Two(c) Three(d)Continue reading “Tough Questions 181-190”

Exam Essentials: Chapter 10

Chapter 10: Physical Security Requirements (WIP) Understand why there is no security without physical security Without control over the physical environment, no amount of administrative or technical/logical controls can provide adequate security. If a malicious person can gain physical access to your facility/equipment, they can do anything they want, including destruction, alteration & disclosure. KnowContinue reading “Exam Essentials: Chapter 10”

Exam Essentials: Chapter 9

Chapter 9: Security Vulnerabilities, Threats & Countermeasures (WIP) Be able to explain the differences between multitasking, multithreading, multiprocessing & multiprogramming Multitasking is the simultaneous execution of more than one application on one computer, and is managed by the OS. Multithreading permits multiple concurrent tasks to be performed within a single process. Multiprocessing is the useContinue reading “Exam Essentials: Chapter 9”

Tough Questions 171-180

Which one of the following algorithms is not supported by the Digital Signature Standard? (a) Digital Signature Algorithm(b) RSA(c) El Gamal DSA(d) Elliptic Curve DSA Answer:(c) Explanation:DSS supports only three encryption algorithms (DSA, RSA & ECDSA) in conjunction with SHA-1 hashing.  Which cryptosystem provides the encryption/decryption technology for the commercial version of the PGP secure email system? (a) ROT13(b)Continue reading “Tough Questions 171-180”

Design a site like this with WordPress.com
Get started