The certificate of a secure public Web server on the Internet should be:
A
A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the
underlined text makes the statement correct.
C
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the
underlined text makes the statement correct.
A
You have an application that uses IPsec to secure communications between an Internet client and a server on the internal
network.
To which network security service must the IPsec client connect?
C
Media Access Control (MAC) filtering enables you to:
A
DRAG DROP
Certain potentially harmful file types should be filtered as attachments of incoming email messages.
Match the file extension that should be filtered with its description.
Instructions: To answer, drag the appropriate file extension from the column on the left to its description on the right. Each
file extension may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to
view content.
Note: For each correct selection is worth one point.
Select and Place:

Setting a database to run on a cluster of servers is an example of applying:
A
Encrypting a hard disk is an example of ensuring:
B
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is
worth one point.
Hot Area:

You have an application that communicates by using plain text. You want to secure communications between the application
and a server at the network layer.
What should you implement?
D
Explanation:
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data sent
over an Internet Protocol network. It operates at the network (layer 3 in the OSI model)
Incorrect Answers:
A, C: TLS and SSH are cryptographic protocols designed to provide communications security over a network. They operate
at the application layer, or layer 7 of the OSI model.
B: SFTP provides file access, file transfer, and file management over a reliable data stream. It operates at the application
layer, or layer 7 of the OSI model.
References: https://en.wikipedia.org/wiki/IPsec https://en.wikipedia.org/wiki/Transport_Layer_Security
https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol