You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. What is the IP protocol ID for TCP?
Answer : C
You have been given the task of implementing the wireless solution for your organization's campus. Which two antenna types are best suited for bridge applications connecting two buildings?
Answer : A, B
When performing wireless network traffic analysis, what is the type and subtype for an 802.11 authentication packet?
Answer : B
You are configuring the IP addressing for your network. One of the subnets has been defined with addresses already. You run ifconfig on a host and determine that it has an address of 10.12.32.18/14. What is the broadcast address for this network?
Answer : E
You are configuring Snort on your new IDS, and wish to categorize the events of the rules you will use. Which keyword is used to categorize Snort events?
Answer : D
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Confidentiality in network security is. Which of the following best describes Confidentiality?
Answer : B
The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is connected to the Internet. The objective is to allow only network 192.168.20.0 to access e-commerce Web sites on the Internet, while allowing all internal hosts to access resources within the internal network. From the following, select all the

Answer : A, B, C, G