Which of the following would you recommend?

Requests for Web-based resources have become unacceptably slow. You have been assigned toimplement a solution that helps solve this problem. Which of the following would you recommend? A. Enable stateful multi-layer inspection on the packet filter B. Implement caching on the network proxy server C. Enable authentication on the network proxy server D. Implement a […]

Read More

Which form of encryption should you use?

You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network.Which form of encryption should you use? A. Asymmetric B. PGP C. Hash D. Symmetric Explanation: Show Answer

Read More

Which of the following is the most likely explanation for this problem?

You purchased a network scanner six months ago. In spite of regularly conducting scans using thissoftware, you have noticed that attackers have been able to compromise your servers over the last month.Which of the following is the most likely explanation for this problem? A. The network scanner needs to be replaced. B. The network scanner […]

Read More