You are the firewall administrator at your company and the network administrators have decided to implement an IPSec VPN
solution. Which port would you need to allow through the firewall to allow the Internet Key Exchange traffic to reach the VPN server
inside your network?
Answer : E
You have run a complete check of your file server using ISS System Scanner. Once the scan has finished, and you wish to learn
more about a vulnerability presented, which of the following is the quickest method to learn more?
Answer : E
In the past it was, at times, difficult to locate current information on security vulnerabilities. What is the name of the security
community's effort to create a comprehensive database of multiple vulnerabilities and security tools?
Answer : C
When installing a firewall, what is the process by which you remove un-needed services and features from a machine to reduce
the risk of vulnerabilities to the underlying OS called?
Answer : E
As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on Business Continuity Planning?
Answer : C
You are considering adding layers to your authentication system currently in place. Reading through some of the vendor
literature on logon solutions, it frequently mentions two and three factor authentication. Your assistant asks you what the difference
between the two is. Select the options that correctly describe two-factor and three-factor authentication:
Answer : A, D
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to
security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network
security. One of your assistants asks what the function of Confidentiality in network security is. Which of the following best describes
Confidentiality?
Answer : B