PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following security threats may occur if DMZ protocol attacks are performed?

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

Which of the following utilities can Jason use to accomplish the task?

Jason works as a System Administrator for Passguide Inc. The company has a Windows-based
network. Sam, an employee of the company, accidentally changes some of the applications and
system settings. He complains to Jason that his system is not working properly. To troubleshoot
the problem, Jason diagnoses the internals of his computer and observes that some changes
have been made in Sam’s computer registry. To rectify the issue, Jason has to restore the
registry.
Which of the following utilities can Jason use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following Steganography attacks is Victor using?

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to
test an image, in which some secret information is hidden, using Steganography. Victor performs
the following techniques to accomplish the task:
1. Smoothening and decreasing contrast by averaging the pixels of the area where significant
color transitions occurs.
2. Reducing noise by adjusting color and averaging pixel value.
3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

Which of the following folders on the local computer will you review to accomplish the task?

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to
investigate e-mail information of an employee of the company. The suspected employee is using
an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local
computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following tools can John use to accomplish the task?

John works as a Network Security Professional. He is assigned a project to test the security of
www.we-are-secure.com. He is working on the Linux operating system and wants to install an
Intrusion Detection System on the We-are-secure server so that he can receive alerts about any
hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

What else should you do?

You manage a Windows Server 2008 server named uCert1 in a domain named PassGuide.com.
uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named
PassGuideInternal.
You want to ensure that all authentication traffic to the Web site is encrypted securely without the
use of SSL. You disable Anonymous Authentication. What else should you do?


Page 160 of 231« First...102030...158159160161162...170180190...Last »