Which of the following companies are the providers of Anti-virus softwares?
An Anti-Virus software is used to prevent, detect, and remove malware from a system, including
computer viruses, worms, and Trojan horses. Which of the following companies are the providers
of Anti-virus softwares?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following can be used to perform stress testing?
Burp Suite is a Java application for attacking web applications. This tool includes a proxy server, a
spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking
on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based
network. Jason successfully enters the target system remotely by using the advantage of
vulnerability. He places a Trojan to maintain future access and then disconnects the remote
session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for
DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that
some irrelevant log files and signs of Trojans are present on the computers. He suspects that a
malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and
catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators
catch him?
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the
security of www.we-are-secure.com. The company has provided the following information about
the infrastructure of its network:
·Network diagrams of the we-are-secure infrastructure
·Source code of the security tools
· IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its
network?
Which of the following types of firewall functions by creating two different communications…?
Which of the following types of firewall functions by creating two different communications, one
between the client and the firewall, and the other between the firewall and the end server?
Which of the following layers of the OSI model provides non-repudiation services?
Which of the following layers of the OSI model provides non-repudiation services?
Which of the following statements are true about AWStats?
Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from
various resources such as Apache log files, IIS logs, streaming servers, and some FTP servers.
He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam
decides to use AWStats application. Which of the following statements are true about AWStats?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the d
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS)
to encrypt the data stored on a disk on a file-by-file basis?
Who among the following can authenticate from the access point of the network?
You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy
(WEP) for wireless security. Who among the following can authenticate from the access point of
the network?
Which of the following type of witnesses is a lay witness?
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He
is working on a case of a cyber crime. Peter knows that the good investigative report should not
only communicate the relevant facts, but also present expert opinion. This report should not
include the cases in which the expert acted as a lay witness. Which of the following type of
witnesses is a lay witness?