Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?
Correct Answer:
C
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.company.com. What is the most likely cause?
Correct Answer:
D
Which of the following is the most secure method of authentication?
Correct Answer:
D
Which of the following schemes is used by the Kerberos authentication?
Correct Answer:
C
Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?
Correct Answer:
D