I got a 684. Not sure which ones I missed but below are the ones I found difficulty in. I wrote these down in the test center and after I failed, I stayed and tried to memorize them (there were a few more but I can't remember them). I read a few books but they didn't fully cover these questions. Know of any resources to get the correct info? Thanks. techie164 at yahoo
non-essential services, what to do about them (I know they should be disabled, but a few of the answers were tricky. One simply said disable the ones I don't need, and another said plan or make an assessment about which are needed and which one should be disabled. That confused me.)
How SMTP relay works. (something about /etc/mail/relay and rejecting entries and restarting the process)
The disadvantage of symmetric cryptography
advantages of a multi-homed firewall
what programming errors lead to
Types of handshakes for SSL (I thought there was only one, 6-step handshake)
To get a certificate you need identification and ______.
systems considered in a disaster recovery plan (I think its either ALL systems, or just the ones assessed in a risk assessment)
What the Wireless Access Protocol (WAP) is based on
What happens when anonymous FTP is enabled
Facts about NDA, DAN, NAD or something (I remember it being apart of LDAP was one of the answers)
When ActiveX controls are executed
something about what uses sensitivity lables (not sure if MAC, DAC, or RBAC were included in the answers)
a question about ISAKMP
Something about Kerberos and realms
non-essential services, what to do about them (I know they should be disabled, but a few of the answers were tricky. One simply said disable the ones I don't need, and another said plan or make an assessment about which are needed and which one should be disabled. That confused me.)
How SMTP relay works. (something about /etc/mail/relay and rejecting entries and restarting the process)
The disadvantage of symmetric cryptography
advantages of a multi-homed firewall
what programming errors lead to
Types of handshakes for SSL (I thought there was only one, 6-step handshake)
To get a certificate you need identification and ______.
systems considered in a disaster recovery plan (I think its either ALL systems, or just the ones assessed in a risk assessment)
What the Wireless Access Protocol (WAP) is based on
What happens when anonymous FTP is enabled
Facts about NDA, DAN, NAD or something (I remember it being apart of LDAP was one of the answers)
When ActiveX controls are executed
something about what uses sensitivity lables (not sure if MAC, DAC, or RBAC were included in the answers)
a question about ISAKMP
Something about Kerberos and realms