PrepAway - Latest Free Exam Questions & Answers

Tag: Exam ECSS

Which of the following tools works as a firewall for the Linux 2.4 kernel?

A firewall is a combination of hardware and software, used to provide security to a network. It is
used to protect an internal network or intranet against unauthorized access from the Internet or
other outside networks. It restricts inbound and outbound access and can analyze all traffic
between an internal network and the Internet. Users can configure a firewall to pass or block
packets from specific IP addresses and ports. Which of the following tools works as a firewall for
the Linux 2.4 kernel?

Which of the following cryptographic algorithms is being used by the We-are-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to
a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is
using does not authenticate participants. Which of the following cryptographic algorithms is being
used by the We-are-secure server?

Which of the following methods has the attacker used to crack Andrew’s password?

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses ‘Faulkner’ as
the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating
that his gmail account has been hacked. He also finds that some of his important mails have been
deleted by someone. Which of the following methods has the attacker used to crack Andrew’s
password?
Each correct answer represents a complete solution. Choose all that apply.


Page 7 of 28« First...56789...20...Last »