Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements about a brute force attack is true?

A.

It is a program that allows access to a computer without using security checks.

B.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

C.

It is a virus that attacks the hard drive of a computer.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

A.

Teardrop attack

B.

SYN flood attack

C.

Ping of Death attack

D.

DDoS attack

You have purchased a wireless router for your home network. What will you do first to enhance the security?

A.

Change the default password and administrator's username on the router

B.

Disable the network interface card on the computer

C.

Configure DMZ on the router

D.

Assign a static IP address to the computers

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

A.

Recovery

B.

Contamination

C.

Identification

D.

Eradication

E.

Preparation

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

A.

Say thank you and let them pay for the travel, it is the least they can do.

B.

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

C.

Say nothing as to not hurt the feelings of the children's hospital.

D.

Ask if the hospital could pay for some of the supplies too.

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

What is VeriSign?

A.

It is a data warehouse.

B.

It is an e-commerce portal.

C.

It is a search engine.

D.

It is a payment gateway.

Which of the following types of attack can guess a hashed password?

A.

Teardrop attack

B.

Evasion attack

C.

Denial of Service attack

D.

Brute force attack

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

A.

Antivirus software is running on the computer.

B.

You have provided an improper product key.

C.

The computer is running a driver that is incompatible with Vista.

D.

The computer has a hardware device that is incompatible with Vista.