Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
Answer : C
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?
Answer : D
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the
TCP/IP model?
Answer : A
Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?
Answer : A
Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?
Answer : D
You are the Network Administrator for a college. You watch a large number of people
(some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?
Answer : B
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
Answer : B
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Answer : A
Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?
Answer : B
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Answer : C
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?
Answer : B
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
Answer : C
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
Answer : BD
Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.
Answer : ACD
Which of the following protocols is used to compare two values calculated using the
Message Digest (MD5) hashing function?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us