Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer
Which of the following technologies is used to detect unauthorized attempts to access and
manipulate computer systems locally or through the Internet or an intranet?
What will you configure on the laptop to accomplish the task?
You work as a Network Administrator for Infonet Inc. The company’s office has a wireless network.
Wireless access point on the network works as a router and DHCP server. You want to configure
a laptop to connect to the wireless network. What will you configure on the laptop to accomplish
the task?
which of the following access control models can a user not grant permissions to other users to see a copy of
In which of the following access control models can a user not grant permissions to other users to
see a copy of an object marked as secret that he has received, unless they have the appropriate
permissions?
Which of the following will you use to scan the log files?
You work as a Network Administrator for DataSoft Inc. The company needs a secure network. You
have been assigned the task to track the network attacks that have occurred within the last one
month. To accomplish the task, you need to scan the log files for suspicious events and patterns.
Which of the following will you use to scan the log files?
Which of the following is a valid IP address for class B Networks?
Which of the following is a valid IP address for class B Networks?
Which of the following protocols provides a secure connection to the Internet?
Maria works as a Security Administrator for NetPerfect Inc. The company has a Windows-based
network. Maria wants to ensure that the Sales executives of the company are able to surf the
Internet only through a secure URL. Which of the following protocols provides a secure connection
to the Internet?
Which of the following types of cybercrime is Sam performing?
Sam, a bank employee, develops a program and uploads it to the bank’s server. He deducts $1 a
month from the account of every customer using the program. Probably no account holder will
notice this type of illegal debit, but Sam will make a good amount of money every month. Which of
the following types of cybercrime is Sam performing?
which amongst the following countries is on the top, in hosting malware on the web?
According to the Sophos Security Threat Report 2009, which amongst the following countries is on
the top, in hosting malware on the web?
Which of the following commands will you use to accomplish the task?
You have made a program secure.c to display which ports are open and what types of services
are running on these ports. You want to write the program’s output to standard output and
simultaneously copy it into a specified file. Which of the following commands will you use to
accomplish the task?
Which of the following are the ways of sending secure e-mail messages over the Internet?
Which of the following are the ways of sending secure e-mail messages over the Internet?
Each correct answer represents a complete solution. Choose two.