Which of the following practices come in the category of denial of service attack?
Each correct answer represents a complete solution. Choose three.
Answer : ABD
stand for?
Answer : A
Which of the following authentication methods support mutual authentication?
Each correct answer represents a complete solution. Choose two.
Answer : AB
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the _______________ layer of the
TCP/IP model.
Answer : A
Which of the following are the application layer protocols for security?
Each correct answer represents a complete solution. Choose three.
Answer : ACD
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the
We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
Answer : D
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
Answer : B
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?
Answer : D
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?
Answer : C
components?
Each correct answer represents a complete solution. Choose three.
Answer : ABC
are true?
Each correct answer represents a complete solution. Choose two.
Answer : CD
You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ACD
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Answer : A
Which of the following protocols work at the data-link layer?
Each correct answer represents a complete solution. Choose two.
Answer : CD
Which of the following terms refers to the method that allows or restricts specific types of
Answer : C
Have any questions or issues ? Please dont hesitate to contact us