The ______ encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which
Fill
in the blank with the appropriate encryption system.
The ______ encryption system is an asymmetric key encryption algorithm for the public-key
cryptography, which is based on the DiffieHellman key agreement.
Which of the following actions will you take for this?
You
are the Network Administrator for a large corporate network. You want to monitor all network
traffic on your local network for suspicious activities and receive a notification when a possible
attack is in process. Which of the following actions will you take for this?
Which of the following layers of the OSI model are tested through this process?
You work as a Network Administrator for McRoberts Inc. You are expanding your company’s
network. After you have implemented the network, you test the connectivity to a remote host by
using the PING command. You get the ICMP echo reply message from the remote host. Which of the
following layers of the OSI model are tested through this process? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following devices is best for that room?
You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without
any window and is totally in darkness. For security reasons, you want to place a device in the room.
Which of the following devices is best for that room?
which of the following Person-to-Person social engineering attacks does an attacker…?
In which of the following Person-to-Person social engineering attacks does an attacker pretend to be
an outside contractor, delivery person, etc., in order to gain physical access to the organization?
Which of the following scanning techniques will he use to accomplish this task?
John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in
company’s server using a port scanner. However, he does not want to establish a full TCP
connection. Which of the following scanning techniques will he use to accomplish this task?
Which of the following layers of the OSI model provides non-repudiation services?
Which of the following layers of the OSI model provides non-repudiation services?
Which of the following devices can be used in place of a hub to control the network traffic efficiently?
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network.
Performance of the network is slow because of heavy traffic. A hub is used as a central connecting
device in the network. Which of the following devices can be used in place of a hub to control the
network traffic efficiently?
Which of the following categories of access controls is deployed in the organization to prevent all direct con
Which of the following categories of access controls is deployed in the organization to prevent all
direct contacts with systems?
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured n
Which of the following is an infrastructure system that allows the secure exchange of data over an
unsecured network?