Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Which of the following authentication methods prevents unauthorized execution of code on remote
systems?
which of the following layers of the OSI reference model do these routers filter information?
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packetfiltering firewall and has the capability to filter on some of the contents of packets. On which of the
following layers of the OSI reference model do these routers filter information? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following types of encryption does SSL use?
Andrew works as a Network Administrator for Infonet Inc. The company’s network has a Web server
that hosts the company’s Web site. Andrew wants to increase the security of the Web site by
implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
Which of the following cryptographic algorithms is being used by the Weare-secure server?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security
of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not
thenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?
Which of the following will she use to accomplish the task?
Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the
presentation. Which of the following will she use to accomplish the task?
Which of the following social engineering attacks did he just perform?
John works as a Programmer for We-are-secure Inc. On one of his routine visits to the company, he
noted down the passwords of the employees while they were typing them on their computer
screens. Which of the following social engineering attacks did he just perform?
Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of
Which of the following electrical events shows a sudden drop of power source that can cause a wide
variety of problems on a PC or a network?
which a business process must be restored after a disaster in order to avoid unacceptable consequences associa
Which of the following is the duration of time and a service level within which a business process
must be restored after a disaster in order to avoid unacceptable consequences associated with a
break in business continuity?
Which of the following phases of the Incident handling process should you follow next to handle this incident?
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked
to your internal enterprise network. Which of the following phases of the Incident handling process
should you follow next to handle this incident?
Which of the following locations must have a camera in order to provide the minimum level of security for the
You have decided to implement video surveillance in your company in order to enhance network
security. Which of the following locations must have a camera in order to provide the minimum level
of security for the network resources? Each correct answer represents a complete solution. Choose
two.
