New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where

significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

A.

Chosen-Stego Attack

B.

Active Attacks

C.

Stegdetect Attack

D.

Steg-Only Attack

As an attacker, you are sending very small sized packets with durations of 15 minutes per packet to the IIS Web server. Since an IIS session remains alive for a long time, the IDS may be tricked into accepting them as regular packet transformations. Which of the following types of attacking methods are you using?

A.

Session splicing

B.

Nonblind spoofing

C.

Session hijacking

D.

Security Logging

You work as a Security Administrator for uCertify Inc. You are concerned about the password security. Therefore, you have decided to apply a policy that will be helpful for others to create strong passwords. Which of the following are the important things that should be remembered to create a strong password?

Each correct answer represents a complete solution. Choose all that apply.

A.

It should be of eight characters.

B.

It should be a known word.

C.

It should contain at least one number or punctuation character.

D.

It should contain at least one capital letter.

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

A.

Install the IAS server on the system to verify Internet related activities.

B.

Install the RADIUS server to check the authentication of the invader.

C.

Install the application that is designed to record the activities of the invader.

D.

Install the operating system without patches installed and use typical defaults and options.

You work as a Security Administrator for uCertify Inc. You have developed a user manual for internal use, which will help your colleagues to work efficiently in the organization. However, you are concerned about the possibility of the user manual being distributed to the public. Therefore, you have decided to implement a system of classification so that you can secure information. Which of the following information classification levels will you use to implement the system?

A.

Classified

B.

Public or unclassified

C.

Department specific

D.

Private or confidential

Which of the following statements is true about pattern matching IDS?

A.

IDS can match empty list only.

B.

IDS can only be effective unless the company's security policies are not defined and followed in practice.

C.

IDS can trigger only on signatures that are stored in the database of the IDS.

D.

IDS can detect only when an attacker is passively sniffing data.

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

A.

Utility model

B.

Cookie

C.

Trade secret

D.

Copyright

What is the name given to the system that guarantees the coherence of information security in the organization?

A.

Information Security Management System

B.

Rootkit

C.

Stemkit

D.

Security regulations for special information for the government

Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?

A.

UDP

B.

SMTP

C.

ICMP

D.

SNMP

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

A.

Developing risk management plan to identify risks based on documents

B.

Developing project charter and risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Identifying and analyzing risk events using qualitative and quantitative techniques