Which of the following is considered an acceptable option when managing a risk?
Which of the following is considered an acceptable option when managing a risk?
Which of the following is the most secure encryption protocol that the network administrator should recommend?
A person approaches a network administrator and wants advice on how to send encrypted email
from home. The end user does not want to have to pay for any license fees or manage server
services. Which of the following is the most secure encryption protocol that the network
administrator should recommend?
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing att
Which of the following countermeasure can specifically protect against both the MAC Flood and
MAC Spoofing attacks?
You can always defend yourself by "ignorance of the law" clause.
A company is legally liable for the content of email that is sent from its systems, regardless of
whether the message was sent for private or business-related purposes. This could lead to
prosecution for the sender and for the company’s directors if, for example, outgoing email was
found to contain material that was pornographic, racist, or likely to incite someone to commit an
act of terrorism. You can always defend yourself by “ignorance of the law” clause.
What is found in all versions of NTFS and is described as the ability to fork file data into existing files
__________ is found in all versions of NTFS and is described as the ability to fork file data into
existing files without affecting their functionality, size, or display to traditional file browsing utilities
like dir or Windows Explorer
What technique does Jimmy use to compromise a database?
Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines
to create or alter SQL commands to gain access to private data or execute commands in the
database. What technique does Jimmy use to compromise a database?
What is Paul seeing here?
Paul has just finished setting up his wireless network. He has enabled numerous security features
such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his
wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes
54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router’s
management utility and notices that a machine with an unfamiliar name is connected through his
wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the
same MAC address as his laptop. What is Paul seeing here?
What is this technique called?
This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and
the IDS will not spot the true nature of the fully assembled datagram. The datagram is not
reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to
reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the
network. What is this technique called?
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and the destinati
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and
the destination host is several hops away? (Select 2 answers)