Which of the following uses public key cryptography to encrypt the contents of files?
Which of the following uses public key cryptography to encrypt the contents of files?
Which of the following softwares is used to perform constant monitoring of the network infrastructure?
Which of the following softwares is used to perform constant monitoring of the network
infrastructure?
Which of the following actions will you perform to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server
2008 network environment. The network is configured as a Windows Active Directory-based single
forest domain-based network. The company has recently provided fifty laptops to its sales team
members. You are required to configure an 802.11 wireless network for the laptops. The sales
team members must be able to use their data placed at a server in a cabled network. The planned
network should be able to handle the threat of unauthorized access and data interception by an
unauthorized user. You are also required to prevent the sales team members from communicating
directly to one another. Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about session hijacking?
Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?
Which of the following Linux rootkits allows attackers to hide files, processes, and network
connections?
Each correct answer represents a complete solution. Choose all that apply.
Who among the following are security experts who specialize in penetration testing and other testing methodolo
Who among the following are security experts who specialize in penetration testing and other
testing methodologies to ensure that their company’s information systems are secure?
Each correct answer represents a complete solution. Choose all that apply.
you need to conduct to resolve the problem?
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do
you need to conduct to resolve the problem?
Which of the following activities is Jason involved in?
Jason, a cybercriminal, sells illegal articles on the Internet. Which of the following activities is
Jason involved in?
Which of the following metrics is NOT included in the routing table?
In a complex network, Router transfers data packets by observing some form of parameters or
metrics provided in the routing table. Which of the following metrics is NOT included in the routing
table?
Which of the following tools works as a firewall for the Linux 2.4 kernel?
A firewall is a combination of hardware and software, used to provide security to a network. It is
used to protect an internal network or intranet against unauthorized access from the Internet or
other outside networks. It restricts inbound and outbound access and can analyze all traffic
between an internal network and the Internet. Users can configure a firewall to pass or block
packets from specific IP addresses and ports. Which of the following tools works as a firewall for
the Linux 2.4 kernel?