- (Exam Topic 1)
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?
Correct Answer:
D
- (Exam Topic 1)
Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABD
- (Exam Topic 2)
Which of the following authentication methods provides credentials that are only valid during a single session?
Correct Answer:
D
- (Exam Topic 2)
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?
Correct Answer:
A
- (Exam Topic 1)
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?
Correct Answer:
B