Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Your computer continues to operate even if its disk drive has failed. This ability is known as _____.

A.

Recovery

B.

Fault Tolerance

C.

Backups

D.

Disaster Recovery

E.

Hashing

F.

Independent Disks

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

A.

Teardrop attack

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 1029

B.

18 U.S.C. 1028

C.

18 U.S.C. 1030

D.

18 U.S.C. 2510

Which of the following types of firewalls forms a session flow table?

A.

Proxy server firewall

B.

Packet filtering firewall

C.

Stateless packet filtering firewall

D.

Stateful packet filtering firewall

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.

Which of the following attacking methods can he use to send the dangerous software protocols?

A.

HTTP tunneling

B.

URL obfuscation

C.

Banner grabbing

D.

MAC spoofing

The method used to encrypt messages by transposing or scrambling the characters in a certain manner is known as ______.

A.

Quantum cipher

B.

Transposition cipher

C.

Hybrid systems

D.

Mathematical cipher

E.

Substitution cipher

F.

Steganography

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Rule based attack

C.

Brute Force attack

D.

Hybrid attack

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

A.

Stateful

B.

Application level proxy

C.

Circuit level proxy

D.

Packet filtering

Bluetooth uses the _________ specification in the ________ band with FHSS technology.

A.

IEEE 802.11, 2.4-2.5 GHz

B.

IEEE 802.11, 1.4-2.5 GHz

C.

IEEE 802.15, 1.5-2.0 GHz

D.

IEEE 802.15, 2.4-2.5 GHz

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a digital representation of information that identifies users.

B.

It uses asymmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It uses symmetric key pairs.