- (Exam Topic 2)
Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?
Correct Answer:
C
- (Exam Topic 1)
You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?
Correct Answer:
C
- (Exam Topic 1)
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
Correct Answer:
C
- (Exam Topic 1)
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
Correct Answer:
BC
- (Exam Topic 2)
Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.
Correct Answer:
AC