What technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?

What technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet? asymmetric key algorithm digital signature encryption hash algorithm Answers Explanation & Hints: Digital signatures provide assurance of the authenticity and integrity of software codes. They provide the ability to trust code that is downloaded […]
Continue reading…

 

What is a difference between symmetric and asymmetric encryption algorithms?

What is a difference between symmetric and asymmetric encryption algorithms? Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms. Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages. Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt […]
Continue reading…

 

Why are DES keys considered weak keys?

Why are DES keys considered weak keys? They are more resource intensive. DES weak keys are difficult to manage. They produce identical subkeys. DES weak keys use very long key sizes. Answers Explanation & Hints: Weak keys, whether part of an existing encryption algorithm or manually generated, reveal regularities in encryption. This creates a shortcut […]
Continue reading…

 

One method used by Cryptanalysts to crack codes is based on the fact that some letters of the English language are used more often than others. Which term is used to describe this method?

One method used by Cryptanalysts to crack codes is based on the fact that some letters of the English language are used more often than others. Which term is used to describe this method? cybertext meet-in-the-middle frequency analysis known-plaintext Answers Explanation & Hints: Frequency analysis uses the fact that some characters in the English alphabet […]
Continue reading…

 

During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?

During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential? a symmetric or asymmetric encryption algorithm such as AES or PKI a hashing algorithm such as MD5 a hash […]
Continue reading…

 

Refer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands?

Refer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands? DAI will validate only the IP addresses. DAI will validate only the destination MAC addresses. DAI will validate both source and destination MAC addresses as well as the IP addresses in the order […]
Continue reading…

 

What are three techniques for mitigating VLAN hopping attacks? (Choose three.)

What are three techniques for mitigating VLAN hopping attacks? (Choose three.) Disable DTP. Enable trunking manually. Set the native VLAN to an unused VLAN. Enable BPDU guard. Enable Source Guard. Use private VLANs. Answers Explanation & Hints: Mitigating a VLAN hopping attack can be done by disabling Dynamic Trunking Protocol (DTP), manually setting ports to […]
Continue reading…

 

Which two security features can cause a switch port to become error-disabled? (Choose two.)

Which two security features can cause a switch port to become error-disabled? (Choose two.) root guard PortFast with BPDU guard enabled protected ports storm control with the trap option port security with the shutdown violation mode Answers Explanation & Hints: Error-disabled mode is a way for a switch to automatically shut down a port that […]
Continue reading…

 

A company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?

A company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated? SNMP EAPOL broadcasts such as ARP any data encrypted with 3DES or AES Answers Explanation & Hints: 802.1X prevents unauthorized devices from gaining access […]
Continue reading…

 

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication? RADIUS TACACS+ SSH MD5 Answers Explanation & Hints: Encapsulation of EAP data between the authenticator and the authentication server is performed using RADIUS.
Continue reading…

 

A company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops?

A company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops? AMP 802.1X RADIUS BitLocker Answers Explanation & Hints: Storage devices can be encrypted to protect data from unauthorized access. Windows BitLocker provides drive encryption.
Continue reading…