- (Topic 2)
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ACD
- (Topic 2)
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.
Correct Answer:AC
- (Topic 2)
Which of the following protocols implements VPN using IPSec?
Correct Answer:D
- (Topic 1)
Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABCD
- (Topic 2)
Which of the following processes is responsible for low risk, frequently occurring low cost changes?
Correct Answer:C