Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

A.

File Transfer Protocol (FTP)

B.

Remote Procedure Call (RPC)

C.

Network File System (NFS)

D.

Transmission Control Protocol (TCP)

Which of the following is used by attackers to obtain an authenticated connection on a network?

A.

Back door

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Man-in-the-middle attack

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

A.

Ping flood attack

B.

Smurf DoS attack

C.

Fraggle DoS attack

D.

Teardrop attack

Which of the following defines the communication link between a Web server and Web applications?

A.

Firewall

B.

IETF

C.

CGI

D.

PGP

Which of the following tools is NOT used for logging network activities in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

A.

Timbersee

B.

PsGetSid

C.

PsLoggedOn

D.

Swatch

Which of the following statements about certification authority (CA) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is an entity in a network, which manages security credentials and public keys for message encryption.

B.

It issues certificates that confirm the identity and other attributes of a certificate in relation to other entities.

C.

It is an entity in a network, which manages files and objects.

D.

It issues private keys that confirm the identity and other attributes of a certificate in relation to other entities.

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

A.

It filters traffic based on IP addresses.

B.

It filters traffic based on MAC addresses.

C.

It assigns a different network address per port.

D.

It forwards broadcast packets.

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.

Backup policy

B.

Network security policy

C.

Privacy policy

D.

User password policy

Which of the following is not a level of military data-classification system?

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

A.

TCP SYN/ACK

B.

IDLE

C.

UDP

D.

RPC

Which of the following is a technique used to attack an Ethernet wired or wireless network?

A.

DNS poisoning

B.

Keystroke logging

C.

Mail bombing

D.

ARP poisoning

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

A.

Blowfish

B.

DES

C.

Diffie-Hellman

D.

RC5

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

A.

Web caching

B.

Hacking

C.

Packet filtering

D.

Spoofing