COMPLETE SOLUTIONS.
1 of 80
Term
The PC Card and CardBus devices are being replaced by what
technology?
Give this one a try later!
ExpressCard Video Card
Reverse Proxy Firewire
, Don't know?
2 of 80
Term
Select below the layer of the OSI model at which the route a packet
is to take is determined, and the addressing of the packet is
performed.
Give this one a try later!
Session Network
Physical Application
Don't know?
3 of 80
Term
An access point that is unauthorized and allows an attacker to
bypass network security configurations is considered to be what
type of access point?
Give this one a try later!
rogue secure
, worm sanctioned
Don't know?
4 of 80
Term
Select the EAP protocol supported by WPA2 Enterprise that
securely tunnels any credential form for authentication using TLS:
Give this one a try later!
Eap-sim Eap-ssl
EAP-FAST Peap-chap
Don't know?
5 of 80
Term
Digital signatures actually only show that the public key labeled as
belonging to the person was used to encrypt the digital signature.
Give this one a try later!
, rogue VLAN
true PEAP
Don't know?
6 of 80
Term
What term is used to describe the operation of stockrooms where
mobile devices are stored prior to their dispersal to employees?
Give this one a try later!
Key escrow Inventory control
Materials management Screen locks
Don't know?
7 of 80
Term
Using what mechanism below can the non-repudiation of an e-mail
and it's content be enforced?
Give this one a try later!