Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?

A.

Determining the number of security associations

B.

Negotiating the authentication method

C.

Determining the network identification number

D.

Negotiating the version of IP to be used

Full Access
Question # 5

You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?

A.

Authentication

B.

Encryption

C.

Non-repudiation

D.

Data integrity

Full Access
Question # 6

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

A.

Application layer

B.

Network layer

C.

Session layer

D.

Transport layer

Full Access
Question # 7

Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

A.

Enable stateful multi-layer inspection on the packet filter

B.

Implement caching on the network proxy server

C.

Enable authentication on the network proxy server

D.

Implement a screening router on the network DMZ

Full Access
Question # 8

At what layer of the OSI/RM does a packet filter operate?

A.

Layer 1

B.

Layer 3

C.

Layer 5

D.

Layer 7

Full Access
Question # 9

Which algorithm can use a 128-bit key, and has been adopted as a standard by various governments and corporations?

A.

MARS

B.

RC2

C.

Advanced Encryption Standard (AES)

D.

International Data Encryption Algorithm (IDEA)

Full Access