Which of the following has most likely occurred?
You have discovered that the ls, su and ps commands no longer function as expected. They do
not return information in a manner similar to any other Linux system. Also, the implementation of
Tripwire you have installed on this server is returning new hash values. Which of the following has
most likely occurred?
Which of the following organizations provides regular updates concerning security breaches and issues?
Which of the following organizations provides regular updates concerning security breaches and
issues?
Which form of encryption should you use?
You have been asked to encrypt a large file using a secure encryption algorithm so you can send
it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted
across a network. Which form of encryption should you use?
which all hard disk data is lost?
Which of the following is the most likely first step to enable a server to recover from a denial-ofservice attack in which all hard disk data is lost?
Which of the following is the most likely explanation for this problem?
You purchased a network scanner six months ago. In spite of regularly conducting scans using
this software, you have noticed that attackers have been able to compromise your servers over
the last month. Which of the following is the most likely explanation for this problem?
What is the primary use of hash (one-way) encryption in networking?
What is the primary use of hash (one-way) encryption in networking?
Which of the following will best help you ensure a database server can withstand a recently discovered vulnera
Which of the following will best help you ensure a database server can withstand a recently
discovered vulnerability?
Which of the following is the most effective way to respond to this attack?
You have determined that the company Web server has several vulnerabilities, including a buffer
overflow that has resulted in an attack. The Web server uses PHP and has direct connections to
an Oracle database server. It also uses many CGI scripts. Which of the following is the most
effective way to respond to this attack?
Which of the following standards is used for digital certificates?
Which of the following standards is used for digital certificates?
which activity occurs during the Internet Key Exchange (IKE)?
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange
(IKE)?