Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

A.

The Service Level Manager

B.

The Configuration Manager

C.

The IT Security Manager

D.

The Change Manager

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

A.

They extend the IP addressing scheme.

B.

The same subnet mask is used everywhere on the network.

C.

They support VLSM and discontiguous networks.

D.

IGRP is a classless routing protocol.

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Authenticity

The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for uCertify Software Systems Pvt. Ltd.?

(Click the Exhibit button on the toolbar to see the case study.)

A.

Providing secure communications between Washington and the headquarters office.

B.

Implementing Certificate services on Texas office.

C.

Preventing denial-of-service attacks.

D.

Ensuring secure authentication.

E.

Preventing unauthorized network access.

F.

Providing two-factor authentication.

G.

Protecting employee data on portable computers.

Firekiller 2000 is an example of a __________.

A.

DoS attack Trojan

B.

Data sending Trojan

C.

Remote access Trojan

D.

Security software disabler Trojan

Which of the following processes is responsible for low risk, frequently occurring low cost changes?

A.

Incident Management

B.

IT Facilities Management

C.

Request Fulfillment

D.

Release Management

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases.

The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

A.

209.191.91.180

B.

141.1.1.1

C.

172.16.10.90

D.

216.168.54.25

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

A.

S/MIME

B.

Asymmetric

C.

PGP

D.

Symmetric

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Samhain

B.

SARA

C.

Snort

D.

Tripwire

Which of the following security applications is used to secure a database from unauthorized accesses in a network infrastructure?

A.

Antivirus

B.

Anti-Malware

C.

Anti-Spoofing

D.

Firewall