1:
| Standards for digital IDs and certificates are defined in which of the following documents?- RFC 509
- CCITT X.509
- RFC 905
- CCITT X.905
|
A1:
| Answer: b. The International Telecommunications Union (ITU-T), formerly known as CCITT, provides the CCITT X.509 standard for certificates. |
2:
| List four parameters of a digital ID. |
A2:
| Answer: Parameters of a digital ID include version number, serial number, expiration date, and public key. |
3:
| A host IDS can be embedded in a networking device, a standalone appliance, or a module monitoring the network traffic. True or False? |
A3:
| Answer: False. A host IDS is a server-specific agent that runs on a server. |
4:
| Hardware keys are examples of which of the following?- Firewalls
- PC cardbased solutions
- Digital IDs
- Biometrics
|
A4:
| Answer: b. Hardware keys are examples of PC cardbased solutions. |
5:
| What processes are covered in physical security policies? |
A5:
| Answer: Physical security policies cover internal and external security measures, disaster-recovery plans, and personnel training. |
6:
| List two protocols that can be used for encrypted logins. |
A6:
| Answer: Secure Shell Protocol (SSH), Kerberos, Secure Socket Layer (SSL), and Transport Layer Security (TLS) can be used for encrypted logins. |
7:
| Which three functional areas can be connected to a firewall? |
A7:
| Answer: The three functional areas that can be connected to a firewall are private networks, public networks, and the DMZ networks. |
8:
| Which of the following are default PIX firewall interfaces?- Inside
- Encrypted
- Outside
- Virtual private network (VPN)
|
A8:
| Answer: a and c. The inside interface of the PIX is connected to a private or corporate intranet. The outside interface is typically connected to the Internet. |
9:
| What is file encryption? |
A9:
| Answer: File encryption is a technique that can be used to protect and preserve the integrity of your data locally on your workstation by encrypting the files. |
10:
| List four of the most common biometric technologies.A10:
| Answer: The most common biometric technologies are fingerprint scanning, voice recognition, face recognition, typing biometrics, and signature recognition. |