Question 21
Which of the following protocols is a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and
provides tunneling, address assignment, and authentication?
Question 22
Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?
Question 23
Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?
Question 24
Which of the following IEEE standards defines a physical bus topology?
Question 25
Which of the following incident handling stage removes the root cause of the incident?