Which of the following techniques is he performing to accomplish his task?
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the
company for personal reasons. He wants to send out some secret information of the company. To do
so, he takes an image file and simply uses a tool image hide and embeds the secret file within an
image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using
the image file to send the data, the mail server of his company is unable to filter this mail. Which of
the following techniques is he performing to accomplish his task?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an e
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it
against an established baseline?
Which of the following are the initial steps required to perform a risk analysis process?
Which of the following are the initial steps required to perform a risk analysis process? Each correct
answer represents a part of the solution. Choose three.
Place the appropriate security services in their corresponding categories.
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security
associations (SA)?
Which of the following encryption methods will he use?
Sam is creating an e-commerce site. He wants a simple security solution that does not require each
customer to have an individual key. Which of the following encryption methods will he use?
Which of the following is a technique used for modifying messages, providing Information…?
Computer networks and the Internet are the prime mode of Information transfer today. Which of
the following is a technique used for modifying messages, providing Information and Cyber security,
and reducing the risk of hacking attacks during communications and message passing over the
Internet?
Which of the following processes fulfills the above requirements?
An organization wants to allow a certificate authority to gain access to the encrypted data and
create digital signatures on behalf of the user. The data is encrypted using the public key from a
user’s certificate. Which of the following processes fulfills the above requirements?
Which of the following are the primary components of a discretionary access control (DAC) model?
Which of the following are the primary components of a discretionary access control (DAC) model?
Each correct answer represents a complete solution. Choose two.
Which of the following encryption modes can make protocols without integrity protection…?
Which of the following encryption modes can make protocols without integrity protection even
more susceptible to replay attacks, since each block gets decrypted in exactly the same way?