Which of the following terms is used for the process of securing a system or a device on a network infrastruct
Which of the following terms is used for the process of securing a system or a device on a network
infrastructure?
The __________ command is used to remove the print jobs that have been queued for printing by using a secure c
Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.
The __________ command is used to remove the print jobs that have been queued for printing by using a secure connection.
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points
and the use of wireless attack tools?
Which of the following cryptographic algorithms is being used by the We-are-secure server?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to
a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is
using does not authenticate participants. Which of the following cryptographic algorithms is being
used by the We-are-secure server?
Which of the following methods has the attacker used to crack Andrew’s password?
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses ‘Faulkner’ as
the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating
that his gmail account has been hacked. He also finds that some of his important mails have been
deleted by someone. Which of the following methods has the attacker used to crack Andrew’s
password?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following software helps in protecting the computer against pop-ups, slow performance, and securi
Which of the following software helps in protecting the computer against pop-ups, slow
performance, and security threats caused by spyware and other unwanted software?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about digital signatures?
A digital signature is a type of public key cryptography. Which of the following statements are true
about digital signatures?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following tools can Andrew use to accomplish the task?
Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows-based
environment. The company’s employees use Microsoft Outlook Express as their e-mail client
program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools
can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
Which of the following Incident handling process phases is responsible for defining rules, collaborating human
Which of the following Incident handling process phases is responsible for defining rules,
collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
Which of the following components are usually found in an Intrusion detection system (IDS)?
Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.