Which of the following authentication methods will you suggest?
A company named Money Builders Inc., hires you to provide consultancy for setting up their Windows
network. The company’s server room will be in a highly secured environment. You are required to
suggest an authentication method for it. The CFO of the company wants the server to use thumb
impressions for authentication. Which of the following authentication methods will you suggest?
Which algorithm are they most likely using for hashing?
You
are the Security Consultant and have been contacted by a client regarding their encryption and
hashing algorithms. Their in-house network administrator tells you that their current hashing
algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are
they most likely using for hashing?
Which of the following types of firewalls will you configure to accomplish the task?
You
work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You
need to configure a firewall for the company. The firewall should be able to keep track of the state
of network connections traveling across the network. Which of the following types of firewalls will
you configure to accomplish the task?
Which of the following is violated in a shoulder surfing attack?
Shoulder
surfing is a type of in-person attack in which the attacker gathers information about the premises of
an organization. This attack is often performed by looking surreptitiously at the keyboard of an
employee’s computer while he is typing in his password at any access point such as a terminal/Web
site. Which of the following is violated in a shoulder surfing attack?
Which of the following plans is designed to protect critical business processes…?
Which
of the following plans is designed to protect critical business processes from natural or man-made
failures or disasters and the resultant loss of capital due to the unavailability of normal business
processes?
Which of the following processes is used by remote users to make a secure connection to internal resources aft
Which
of the following processes is used by remote users to make a secure connection to internal resources
after establishing an Internet connection?
Which of the following documents will be useful for you as well as public relations personnel…?
You
work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the
DRP efforts. You have maintained several different types of plan documents, intended for different
audiences. Which of the following documents will be useful for you as well as public relations
personnel who require a non-technical perspective on the entire organization’s disaster recovery
efforts?
Which of the following protects against unauthorized access to confidential information via encryption and wor
Which
of the following protects against unauthorized access to confidential information via encryption and
works at the network layer?
Which of the following statements are true about Public-key cryptography?
Which
of the following statements are true about Public-key cryptography? Each correct answer represents
a complete solution. Choose two.
Which of the following backup types backs up files that have been added and all data that have been modified s
Which
of the following backup types backs up files that have been added and all data that have been
modified since the most recent backup was performed?