Which two statements about the AES algorithm are true? (Choose two)
A. The AES algorithm is an asymmetric block cipher.
B. The AES algorithm operates on a 128-bits block.
C. The AES algorithm uses a fixed length-key of 128 bits.
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.
Answer: B,E
Question: 2
What are three pieces of data you should review in response to a suspected SSL MITM attack? (Choose three)
A. The IP address of the SSL server
B. The X.509 certificate of the SSL server
C. The MAC address of the attacker
D. The MAC address of the SSL server
E. The X.509 certificate of the attacker
F. The DNS name off the SSL server
Answer: A,B,F
Question: 3
You applied this VPN cluster configuration to n a Cisco ASA and the cluster failed to form. How do you edit the configuration to correct the problem?
A. Define the maximum allowable number of VPN connections.
B. Define the master/slave relationship.
C. Configure the cluster IP address.
D. Enable load balancing.
Answer: C
Question: 4
What are two of the valid IPv6 extension headers? (Choose two)
A. Protocol
B. Options
C. Authentication Header
D. Next Header
E. Mobility
F. Hop Limit
Answer: C,E
Question: 5
What security element must an organization have in place before it can implement a security audit and validate the audit results?
A. firewall
B. network access control
C. an incident response team
D. a security policy
E. a security operation center
Answer: D