Which of the following statements about Microsoft hotfix are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is a process of monitoring data packets that travel across a network?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He is using the TFN and Trin00 tools to test the security of the We-aresecure server, so that he can check whether the server is vulnerable or not. Using these tools, which of the following attacks can John perform to test the security of the We-are-secure server?
Which of the following protocols provides maintenance and error reporting function?
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?
What are the benefits of using a proxy server on a network?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are intrusion detection device?
Fill in the blanks with the appropriate values.
International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.
Which of the following is the most secure policy for a firewall?
Which of the following protocols implements VPN using IPSec?
Which of the following ensures that a sender cannot deny sending a message?
Which of the following statements about IEEE 802.1X standard are true?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols work at the Application layer of an OSI model?
Each correct answer represents a complete solution. Choose three.
Which of the following is used as a transmission media by the fiber-optic cables?
Which of the following classes of IP addresses allows a maximum of 2,097,152 networks?
Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the preattack phase successfully:
•Information gathering
•Determination of network range
•Identification of active systems
•Location of open ports and applications
Now, which of the following tasks should he perform next?
Fill in the blank with the appropriate value.
SHA-1 produces a _________ -bit message digest.
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following task force was formed to examine the impact of Electronic Publishing on the intellectual property rights?
Which of the following is the most secure method of authentication?
Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following should propose applicable and effective security controls for managing the risks?
Which of the following terms describes an attempt to transfer DNS zone data?
Which of the following are the ways of sending secure e-mail messages over the Internet?
Each correct answer represents a complete solution. Choose two.
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following law does not protect intellectual property?
Which of the following law does not protect intellectual property?
Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?
Which of the following protocols work at the network layer?
Each correct answer represents a complete solution. Choose three.
At which of the following OSI model layers does the IPSec protocol work?
Which of the following protocols is used to send e-mails on the Internet?
Which of the following ports is assigned by Internet Assigned Number Authority (IANA) for RADIUS authentication?
Which of the following allows an attacker to enter malicious data into a Website?
Where are user accounts and passwords stored in a decentralized privilege management environment?
Which of the following statements about the availability concept of Information security management is true?
How many keys are used to encrypt data in symmetric encryption?
Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?
Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?
Which of the following are the basic architectures of microprocessors used in modern computers?
Each correct answer represents a complete solution. Choose two.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?
Which of the following types of safes can be chosen by an organization to store data backups or other types of valuables?
Each correct answer represents a complete solution. Choose three.
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.
You are installing Windows 2000 Server. You decide to use RAID-5 volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?
Which of the following books is used to examine integrity and availability?
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
Which of the following statements about buffer overflow is true?
In which type of access control do user ID and password system come under?
Which of the following is the most secure method of authentication?
Which of the following protocols is used with a tunneling protocol to provide security?
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?
You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following tools was developed by the FBI and is used for keystroke logging in order to capture encryption keys and other information useful for deciphering transmissions?
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Which of the following methods is a behavior-based IDS detection method?
Which of the following types of virus is capable of changing its signature to avoid detection?
Which of the following technologies are forms of single sign-on (SSO)?
Each correct answer represents a complete solution. Choose three.
Which of the following are the ways of sending secure e-mail messages over the Internet?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols is used to send e-mails on the Internet?
Which of the following protocols work at the session layer of the OSI model?
Each correct answer represents a complete solution. Choose two.
Which of the following defines the communication link between a Web server and Web applications?
Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?
Routers and firewalls use _______ to determine which packets should be forwarded or dropped.
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about packet filtering is true?
Which of the following statements about certification authority (CA) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.
A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?
Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
Which of the following statements about Digest authentication are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about role-based access control (RBAC) model is true?
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following statements about Due Care policy is true?
Which of the following refers to going through someone's trash to find out useful or confidential information?
Which of the following encryption methods comes under symmetric encryption algorithm?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about service pack are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is a process of monitoring data packets that travel across a network?
At which of the following layers Structured Query Language (SQL) works?
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
Which of the following statements about DMZ is true?
Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following statements about DMZ are true?
Each correct answer represents a complete solution. Choose two.
Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following terms is used for securing an operating system from an attack?