What method would be best for finding such flaws?
You are responsible for security at a company that uses a lot of Web applications. You are most
concerned about flaws in those applications allowing some attacker to get into your network. What
method would be best for finding such flaws?
Which of the following representatives of incident response team takes forensic backups of the systems that ar
Which of the following representatives of incident response team takes forensic backups of the
systems that are the focus of the incident?
Which of the following statements are true about routers?
Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of attacks cannot be prevented by technical measures only?
Which of the following types of attacks cannot be prevented by technical measures only?
which of the following is NOT necessary?
You work as a Network Administrator for Tech Perfect Inc. The company requires a secure
wireless
network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring
ISA Server 2006, which of the following is NOT necessary?
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements best describes a certification authority?
Which of the following statements best describes a certification authority?
Which of the following are good security measures to implement?
You have just set up a wireless network for customers at a coffee shop. Which of the following are
good security measures to implement?
Each correct answer represents a complete solution. Choose two.
Which of the following tools are used to monitor traffic of the Linux operating system?
Linux traffic monitoring tools are used to monitor and quickly detect faults in the network or a
system. Which of the following tools are used to monitor traffic of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
which of the following attacks may he become vulnerable to?
John works as an Office Assistant in DataSoft Inc. He has received an e-mail from
duesoft_lotterygroup@us.com with the following message:
The DueSoft Lottery Incorporation
This is to inform you that you have just won a prize of $7,500.00 for this year’s Annual Lottery
promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect
active online e-mails and select five people every year as our winners through an electronic
balloting machine. Please reply within three days of receiving this e-mail with your full details like
Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your
prize.
If John replies to this e-mail, which of the following attacks may he become vulnerable to?