Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following can be used to warn users about the malicious activity?
A CA is compromised and attacks start distributing maliciously signed software updates. Which of
the following can be used to warn users about the malicious activity?
Which of the following can be used to decrypt the information for retrieval?
After encrypting all laptop hard drives, an executive officer’s laptop has trouble booting to the
operating system. Now that it is successfully encrypted the helpdesk cannot retrieve the data.
Which of the following can be used to decrypt the information for retrieval?
Which of the following devices is MOST likely being used when processing the following?
Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY
Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external
party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is
the reason the ABC company’s security administrator is unable to determine the origin of the
attack?
which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following
information before being granted access: username, password, and a four-digit security pin that
was mailed to him during account registration. This is an example of which of the following?
Which of the following should the security administrator use to identify similar malware?
The security administrator is implementing a malware storage system to archive all malware seen
by the company into a central database. The malware must be categorized and stored based on
similarities in the code. Which of the following should the security administrator use to identify
similar malware?
Which of the following was MOST likely compromised?
The security administrator installed a newly generated SSL certificate onto the company web
server. Due to a mis-configuration of the website, a downloadable file containing one of the pieces
of the key was available to the public. It was verified that the disclosure did not require a reissue of
the certificate. Which of the following was MOST likely compromised?
Which of the following is this an example of?
After analyzing and correlating activity from multiple sensors, the security administrator has
determined that a group of very well organized individuals from an enemy country is responsible
for various attempts to breach the company network, through the use of very sophisticated and
targeted attacks. Which of the following is this an example of?
Which of the following was launched against a company based on the following IDS log? 122.41.15.252 –
Which of the following was launched against a company based on the following IDS log?
122.41.15.252 – – [21/May/2012:00:17:20 +1200] “GET
/index.php?username=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAA HTTP/1.1″ 200 2731 “http://www.company.com/cgibin/forum/commentary.pl/noframes/read/209” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
5.1; Hotbar 4.4.7.0)”