When logging in to a system that uses Challenge/Response authentication what is the order of steps a user must follow to complete the login process?
a. Smart Card ID entered into PC
b. Response number from Smart Card entered into PC
c. Challenge number issues to client
d. Number entered into Smart Card
Answer : C
During the configuration of your newly installed ISA Server 2006, you are creating new rules. Which three of the following answers are used to create a protocol rule in ISA Server 2006?
Answer : B, D, E
You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You mention something in RFC 791, and are asked what that is. What does RFC 791 specify the standards for?
Answer : A
There are several options available to you for your new wireless networking technologies, and you are examining how different systems function. What transmission system uses short bursts combined together as a channel?
Answer : A
You have found a user in your organization who has managed to gain access to a system that this user was not granted the right to use. This user has just provided you with a working example of which of the following?
Answer : A
You have just installed a new IDS and are creating the analysis options. Since you wish for your options to be based on time, which of the following will be able to meet your analysis needs?
Answer : A, B
You have been given the task of adding some new wireless equipment to the existing wireless network in your office. What wireless standard allows for up to 54 Mbps transmission rates and is compatible with 802.11b?
Answer : D