- What is a logical structure of one or more interfaces with the same security policies?
- HIDS
- NIDS
- Control zone
- Security zone
- Which two of the following are classifications for security devices?
- Host-based
- Host-attached
- Network-based
- Network-attached
- A protocol that verifies user credentials performs which part of the AAA function?
- Authorization
- Accounting
- Authentication
- Association
- The two most common of the IPSec protocols are Kerberos and what?
- L2TP
- EAP
- IPSec
- PNAC
- Which of the following modes are associated with IPSec?
- AH
- Transport
- ESP
- Tunnel
- All of the above
- None of the above
- What protocol standard is IEEE 802.1x based on?
- IPSec
- L2TP
- EAP
- DACL
- What are the two approaches of port-based security?
- Dynamic locking
- Static locking
- Certificate locking
- Interface locking
- Which of the following is the data that a standard ACL uses to filter...