Question
1. Which of the following TCP/IP protocols do not relate tosecurity? a. IP b. SNMP c. HTTPS d. FT 2. Aideen sent an email to
1. Which of the following TCP/IP protocols do not relate tosecurity?
a. IP
b. SNMP
c. HTTPS
d. FT
2. Aideen sent an email to her supervisor explaining the DomainName System Security Extensions (DNSSEC). Which of the followingstatements would Aideen have NOT included in her email?
a. It is fully supported in BIND9.
b. It adds additional resource records.
c. It adds message header information.
d. It can prevent a DNS transfer attack.
3. What is the recommended secure protocol for voice and videoapplications?
a. Secure Real-time Transport Protocol (SRTP)
b. Hypertext Transport Protocol Secure (HTTPS)
c. Network Time Protocol (NTP)
d. Secure/Multipurpose Internet Mail Extensions (S/MIME)
4. Which type of log can provide details regardingrequests for specific files on a system?
a. Audit log
b. Event log
c. Access log
d. SysFile log
5. Which type of device log contains the most beneficialsecurity data?
a. Firewall log
b. Email log
c. Switch log
d. Router lo
6. Which type of cloud is offered to specific organizations thathave common concerns?
a. Public cloud
b. Hybrid cloud
c. Private cloud
d. Community cloud
7. Which of these is NOT correct about an SSLaccelerator?
a. It can be a separate hardware card that inserts into a webserver.
b. It can be a separate hardware module.
c. It should reside between the user’s device and the webservers.
d. It can only handle the SSL protocol
Step by Step Solution
3.43 Rating (166 Votes )
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below a IP Internet Protocol does not relate to security It is a networking protocol that is re...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started