Chapter 2Practice Test 2
Which of the following is considered an administrative control?
Biometric device
Mantrap
Security policy
Access control list
If a company has been given a /24 network from its Internet service provider, what CIDR notation would need to be used for each network if the company needed to have eight networks out of that allocation?
/27
/26
/28
/8
What is the default port number for Telnet?
21
23
53
443
What is the protocol commonly used for key exchange, where the keys are mutually derived rather than directly exchanged?
OAKLEY
AES
Diffie-Hellman
PGP
Which algorithm does not provide integrity or confidentiality?
DSA
AES
RC4
PGP
Which of the following acronyms represent the institution that governs North ...
Get CEH v11, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.