Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the
security of www.we-are-secure.com. The company has provided the following information about
the infrastructure of its network:
·Network diagrams of the we-are-secure infrastructure
·Source code of the security tools
· IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its
network?
Which of the following types of firewall functions by creating two different communications…?
Which of the following types of firewall functions by creating two different communications, one
between the client and the firewall, and the other between the firewall and the end server?
Which of the following layers of the OSI model provides non-repudiation services?
Which of the following layers of the OSI model provides non-repudiation services?
Which of the following statements are true about AWStats?
Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from
various resources such as Apache log files, IIS logs, streaming servers, and some FTP servers.
He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam
decides to use AWStats application. Which of the following statements are true about AWStats?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the d
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS)
to encrypt the data stored on a disk on a file-by-file basis?
Who among the following can authenticate from the access point of the network?
You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy
(WEP) for wireless security. Who among the following can authenticate from the access point of
the network?
Which of the following type of witnesses is a lay witness?
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He
is working on a case of a cyber crime. Peter knows that the good investigative report should not
only communicate the relevant facts, but also present expert opinion. This report should not
include the cases in which the expert acted as a lay witness. Which of the following type of
witnesses is a lay witness?
Which of the following tools provides a great solution for auditing and testing the recognition and response c
Which of the following tools provides a great solution for auditing and testing the recognition and
response capabilities of the corporate security defenses?
which of the following steps of malicious hacking does dumpster diving come under?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using dumpster diving to gather information about
Weare- secure, Inc. In which of the following steps of malicious hacking does dumpster diving
come under?
Which of the following software can be used to protect a computer system from external threats (viruses, worms
Which of the following software can be used to protect a computer system from external threats
(viruses, worms, malware, or Trojans) and malicious attacks?
Each correct answer represents a part of the solution. Choose all that apply.