Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

A.

SAX

B.

Persistent

C.

Document Object Model (DOM)

D.

Non persistent

Which of the following sectors on a hard disk contains codes that the computer uses to start the system?

A.

Sector 256

B.

Sector 0

C.

Sector 1

D.

Sector 128

Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?

A.

del

B.

shred

C.

erase

D.

rm

Which of the following is the unspecified address in IPv6?

A.

1:1:1:1:1:1:1:1

B.

0:0:0:0:0:0:0:0

C.

0:0:0:0:0:0:0:1

D.

1:0:0:0:0:0:0:0

Which of the following ports is used by e-mail clients to send request to connect to the server?

A.

Port 21

B.

Port 20

C.

Port 23

D.

Port 25

Which of the following processes is used to convert plain text into cipher text?

A.

Encryption

B.

Decryption

C.

Encapsulation

D.

Steganography

Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?

Each correct answer represents a complete solution. Choose two.

A.

.txt

B.

.pst

C.

.xst

D.

.ost

Which of the following classes refers to the fire involving electricity?

A.

Class B

B.

Class D

C.

Class A

D.

Class C

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer.

You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

A.

start /w ocsetup DNS-Server-Core-Role

B.

start /w ocsetup DnsServer

C.

start /w ocsetup DnsServercorerole

D.

net start "dns server"

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

A.

Pslist -x

B.

Pslist -m

C.

Pslist -t

D.

Pslist -d

Which of the following types of write blocker device uses one interface for one side and a different one for the other?

A.

Pros

B.

Tailgate.

C.

Indiff

D.

Native

What is the maximum size of an IP datagram for Ethernet?

A.

4500 bytes

B.

1024 bytes

C.

1200 bytes

D.

1500 bytes

Which of the following groups provides tools and creates procedures for testing and validating computer forensic software?

A.

Society of Forensic Tools and Testing (SFTT)

B.

National Institute of Standards and Technology (NIST)

C.

Association of Computer Forensic Standards (ACFS)

D.

Forensic Tool and Standards Committee (FTSC)

Which of the following is an expression of interference that triggers a false positive signal during an intrusion detection process performed by IDS?

A.

Confidence value

B.

Handshake

C.

Site policy

D.

Noise

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

A.

Disable anonymous logins in the NNTP configuration manager.

B.

Block port 25 by configuring the firewall.

C.

Block port 119 by configuring the firewall.

D.

Block TCP port 80 by configuring the firewall.