You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Answer : B,C,D
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Answer : AC
You manage a Windows Server 2008 server named uCert1 in a domain named
PassGuide.com.
uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named
PassGuideInternal.
You want to ensure that all authentication traffic to the Web site is encrypted securely without the use of SSL. You disable Anonymous Authentication. What else should you do?
Answer : B
Which of the following password cracking attacks does not use any software for cracking e- mail passwords?
Each correct answer represents a complete solution. Choose all that apply.
Answer : BC
You work as a Sales Manager for NetPerfect Inc. The company has a Windows-based network. You have to often send confidential e-mails and make online payments and purchases. You want to protect transmitted information and also to increase the security of e-mail communications. Which of the following programs or services will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Answer : A,D
The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.? (Click the Exhibit button on the toolbar to see the case study.)
Answer : C,D,F,G
According to the Internet Crime Report 2009, which of the following complaint categories is on the top?
Answer : D
Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?
Answer : A
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
Answer : B
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence.
Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.
Answer : BC
John works as a Security Administrator for NetPerfect Inc. The company uses Windows- based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Answer : A
Which of the following can be used to perform session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Answer : B,C,D
In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?
Answer : C
Which of the following is used to authenticate asymmetric keys?
Answer : A
Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us