Which of the following cryptographic algorithms is being used by the We-are-secure server?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to
a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is
using does not thenticate participants. Which of the following cryptographic algorithms is being
used by the We-are-secure server?
Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of
Which of the following electrical events shows a sudden drop of power source that can cause a
wide variety of problems on a PC or a network?
which a business process must be restored after a disaster in order to avoid unacceptable consequences associa
Which of the following is the duration of time and a service level within which a business process
must be restored after a disaster in order to avoid unacceptable consequences associated with a
break in business continuity?
Which of the following phases of the Incident handling process should you follow next to handle this incident?
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network
linked to your internal enterprise network. Which of the following phases of the Incident handling
process should you follow next to handle this incident?
Which of the following locations must have a camera in order to provide the minimum level of security for the
You have decided to implement video surveillance in your company in order to enhance network
security. Which of the following locations must have a camera in order to provide the minimum
level of security for the network resources? Each correct answer represents a complete solution.
Choose two.
What will you implement to accomplish this?
You work as a Network Administrator for NetTech Inc. You want to have secure communication on
the company’s intranet. You decide to use public key and private key pairs. What will you
implement to accomplish this?
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashi
Which of the following protocols is used to compare two values calculated using the Message
Digest (MD5) hashing function?
Which of the following is a technique used for modifying messages, providing Information and Cyber security
Which of the following is a technique used for modifying messages, providing Information and
Cyber security, and reducing the risk of hacking attacks during communications and message
passing over the Internet?
Which of the following statements about Public Key Infrastructure (PKI) are true?
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct
answer represents a complete solution. Choose two.
Which of the following types of halon is found in portable extinguishers and is stored as a liquid?
Which of the following types of halon is found in portable extinguishers and is stored as a liquid?