Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How many keys are used to encrypt data in symmetric encryption?

A.

Four

B.

One

C.

Two

D.

Three

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk control

D.

Risk identification

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below:

This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME.

Which of the following viruses has the symptoms as the one described above?

A.

Nimda

B.

Chernobyl

C.

Melissa

D.

I Love You

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Password-based authentication

B.

Kerberos authentication

C.

TIS authentication

D.

Rhosts (rsh-style) authentication

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Which of the following protocols is used to send e-mails on the Internet?

A.

HTTP

B.

IMAP4

C.

SMTP

D.

POP3

Which of the following areas of a network contains DNS servers and Web servers for Internet users?

A.

MMZ

B.

VPN

C.

DMZ

D.

VLAN

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Snort

B.

SARA

C.

Samhain

D.

Tripwire

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

A.

TCP port 110

B.

UDP port 161

C.

UDP port 1701

D.

TCP port 443

Which of the following statements about packet filtering is true?

A.

It allows or restricts the flow of encrypted packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of specific types of packets to provide security.

D.

It is used to store information about confidential data.

Which of the following methods is a behavior-based IDS detection method?

A.

Knowledge-based detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Protocol detection

Which of the following statements about smurf is true?

A.

It is a UDP attack that involves spoofing and flooding.

B.

It is an ICMP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server