Which of the following tunneling protocols is used to make data transfers secure on the network layer?
Which of the following OSI layers is used for routers?
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
Denial of service
Which of the following wireless networks transmits data probably at 115 Kbps?
Which of the following is NOT a Wired Equivalent Privacy authentication method?
Media access authentication
Shared key authentication
Open system authentication
Which of the following functions does the RSA Digital Signature combine with public key algorithm to create a more secure signature?
Which of the following algorithms is used by the Advanced Encryption Standard (AES)?
Which of the following is an example of a social engineering attack?
What does CSIRT stand for?
Computer Security Information Response Team
Chief Security Incident Response Team
Computer Security Incident Response Team
Chief Security Information Response Team
Which of the following are the two primary U.S. laws that address cybercrime?
1030 and 1362
1029 and 2510
1030 and 2510
1029 and 1030