1: | Standards for digital IDs and certificates are defined in which of the following documents?
| |
A1: | Answer: b. The International Telecommunications Union (ITU-T), formerly known as CCITT, provides the CCITT X.509 standard for certificates. | |
2: | List four parameters of a digital ID. | |
A2: | Answer: Parameters of a digital ID include version number, serial number, expiration date, and public key. | |
3: | A host IDS can be embedded in a networking device, a standalone appliance, or a module monitoring the network traffic. True or False? | |
A3: | Answer: False. A host IDS is a server-specific agent that runs on a server. | |
4: | Hardware keys are examples of which of the following?
| |
A4: | Answer: b. Hardware keys are examples of PC cardbased solutions. | |
5: | What processes are covered in physical security policies? | |
A5: | Answer: Physical security policies cover internal and external security measures, disaster-recovery plans, and personnel training. | |
6: | List two protocols that can be used for encrypted logins. | |
A6: | Answer: Secure Shell Protocol (SSH), Kerberos, Secure Socket Layer (SSL), and Transport Layer Security (TLS) can be used for encrypted logins. | |
7: | Which three functional areas can be connected to a firewall? | |
A7: | Answer: The three functional areas that can be connected to a firewall are private networks, public networks, and the DMZ networks. | |
8: | Which of the following are default PIX firewall interfaces?
| |
A8: | Answer: a and c. The inside interface of the PIX is connected to a private or corporate intranet. The outside interface is typically connected to the Internet. | |
9: | What is file encryption? | |
A9: | Answer: File encryption is a technique that can be used to protect and preserve the integrity of your data locally on your workstation by encrypting the files. | |
10: | List four of the most common biometric technologies.A10: | Answer: The most common biometric technologies are fingerprint scanning, voice recognition, face recognition, typing biometrics, and signature recognition. |