Which of the following will you use to scan the log files?
You work as a Network Administrator for DataSoft Inc. The company needs a secure network. You
have been assigned the task to track the network attacks that have occurred within the last one
month. To accomplish the task, you need to scan the log files for suspicious events and patterns.
Which of the following will you use to scan the log files?
Which of the following is a valid IP address for class B Networks?
Which of the following is a valid IP address for class B Networks?
Which of the following protocols provides a secure connection to the Internet?
Maria works as a Security Administrator for NetPerfect Inc. The company has a Windows-based
network. Maria wants to ensure that the Sales executives of the company are able to surf the
Internet only through a secure URL. Which of the following protocols provides a secure connection
to the Internet?
Which of the following types of cybercrime is Sam performing?
Sam, a bank employee, develops a program and uploads it to the bank’s server. He deducts $1 a
month from the account of every customer using the program. Probably no account holder will
notice this type of illegal debit, but Sam will make a good amount of money every month. Which of
the following types of cybercrime is Sam performing?
which amongst the following countries is on the top, in hosting malware on the web?
According to the Sophos Security Threat Report 2009, which amongst the following countries is on
the top, in hosting malware on the web?
Which of the following commands will you use to accomplish the task?
You have made a program secure.c to display which ports are open and what types of services
are running on these ports. You want to write the program’s output to standard output and
simultaneously copy it into a specified file. Which of the following commands will you use to
accomplish the task?
Which of the following are the ways of sending secure e-mail messages over the Internet?
Which of the following are the ways of sending secure e-mail messages over the Internet?
Each correct answer represents a complete solution. Choose two.
Which of the following measures would be most helpful in defending against a Denial-ofService (DoS) attack?
You are the Administrator for a corporate network. You are concerned about denial of service
attacks. Which of the following measures would be most helpful in defending against a Denial-ofService (DoS) attack?
Which method would provide the highest level of protection for all data transmitted on the internal network on
Which method would provide the highest level of protection for all data transmitted on the internal
network only?
(Click the Exhibit button on the toolbar to see the case study.)
What takes best advantage of an existing authenticated connection?
Fill in the blank with the appropriate name of the attack.
____________ takes best advantage of an existing authenticated connection.