Front | Back |
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
A. SSL. B. SSH. C. L2TP. D. IPSeC. |
C. L2TP
|
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to
secretly embed data? A. Steganography B. Worm C. Trojan horse D. Virus |
A. Steganography
|
QUESTION NO: 3
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page? A. Teardrop B. TCP/IP hijacking C. Phishing D. Replay |
B. TCP/IP hijacking
|
How should a company test the integrity of its backup data?
A. By conducting another backup B. By using software to recover deleted files C. By restoring part of the backup D. By reviewing the written procedures |
C. By restoring part of the backup
|
Which of following can BEST be used to determine the topology of a network and discover
unknown devices? A. Vulnerability scanner B. NIPS C. Protocol analyzer D. Network mapper |
D. Netowork Mapper
|
When should a technician perform penetration testing?
A. When the technician suspects that weak passwords exist on the network B. When the technician is trying to guess passwords on a network C. When the technician has permission from the owner of the network D. When the technician is war driving and trying to gain access |
C. When the technician has permission from the owner of the network
|
An administrator has implemented a new SMTP service on a server. A public IP address
translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.Which of the following is wrong with the server? A. SMTP open relaying is enableD. B. It does not have a spam filter. C. The amount of sessions needs to be limiteD. D. The public IP address is incorrect. |
A. SMTP open relaying is enableD
|
Which of the following is MOST efficient for encrypting large amounts of data?
A. Hashing algorithms B. Symmetric key algorithms C. Asymmetric key algorithms D. ECC algorithms |
B. Symmetric key algorithms
|
Which of the following is a reason why a company should disable the SSID broadcast of the
wireless access points? A. Rogue access points B. War driving C. Weak encryption D. Session hijacking |
B. War driving
|
Which of the following BEST describes ARP?
A. Discovering the IP address of a device from the MAC address B. Discovering the IP address of a device from the DNS name C. Discovering the MAC address of a device from the IP address D. Discovering the DNS name of a device from the IP address |
C. Discovering the MAC address of a device from the IP address
|
Which of the following would be BEST to use to apply corporate security settings to a device?
A. A security patch B. A security hotfix C. An OS service pack D. A security template |
D. A security template
|