Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?
Answer : C
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
Answer : C
What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?
Answer : D
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
Answer : D
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales
Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?
Answer : A
NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.
Which of the following are its significant steps?
Each correct answer represents a complete solution. Choose two.
Answer : BD
You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?
Answer : A
A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?
Answer : D
Which of the following monitors program activities and modifies malicious activities on a system?
Answer : B
Which of the following statements is not true about a digital certificate?
Answer : D
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
Answer : B
Which of the following Acts enacted in United States allows the FBI to issue National
Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
Answer : A
Which of the following does an anti-virus program update regularly from its manufacturer's
Web site?
Answer : B
You work as a Network Administrator for Infonet Inc. The company has a Windows Server
2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
Answer : D
Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us