Which of the following programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited?
Which of the following features of IE prevent users from a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired EquivalentPrivacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN.However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?Each correct answer represents a part of the solution. Choose three.
You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?
Which of the following statements about Encapsulating Security Payload (ESP) are true?Each correct answer represents a complete solution. Choose two.