Which of the following are good security measures to implement?
You have just set up a wireless network for customers at a coffee shop. Which of the following are
good security measures to implement?
Each correct answer represents a complete solution. Choose two.
Which of the following tools are used to monitor traffic of the Linux operating system?
Linux traffic monitoring tools are used to monitor and quickly detect faults in the network or a
system. Which of the following tools are used to monitor traffic of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
which of the following attacks may he become vulnerable to?
John works as an Office Assistant in DataSoft Inc. He has received an e-mail from
duesoft_lotterygroup@us.com with the following message:
The DueSoft Lottery Incorporation
This is to inform you that you have just won a prize of $7,500.00 for this year’s Annual Lottery
promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect
active online e-mails and select five people every year as our winners through an electronic
balloting machine. Please reply within three days of receiving this e-mail with your full details like
Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your
prize.
If John replies to this e-mail, which of the following attacks may he become vulnerable to?
Some its examples are Trojan, adware, and spyware
Fill in the blank with the appropriate word ___is software that is a subcategory of malware and
refers to unwanted software that performs malicious actions on a user’s computer. Some its
examples are Trojan, adware, and spyware.
Which of the following tools is John using to crack the wireless encryption keys?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The
description of the tool is as follows:
Which of the following tools is John using to crack the wireless encryption keys?
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Which of the following security policies will you implement to keep safe your data when you connect your Lapto
Which of the following security policies will you implement to keep safe your data when you
connect your Laptop to the office network over IEEE 802.11 WLANs?
Each correct answer represents a complete solution. Choose two.
Which of the following is the first computer virus that was used to infect the boot sector of storage media fo
Which of the following is the first computer virus that was used to infect the boot sector of storage
media formatted with the DOS File Allocation Table (FAT) file system?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following statements are true about the Kerberos authentication scheme?
Kerberos is a computer network authentication protocol that allows individuals communicating
over a non-secure network to prove their identity to one another in a secure manner. Which of the
following statements are true about the Kerberos authentication scheme?
Each correct answer represents a complete solution. Choose all that apply.