Which of the following protocols work at the session layer of the OSI model?
Each correct answer represents a complete solution. Choose two.
Which of the following is used by attackers to obtain an authenticated connection on a network?
Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.
Which of the following DoS attacks is Maria using to accomplish her task?
Which of the following defines the communication link between a Web server and Web applications?
Which of the following tools is NOT used for logging network activities in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about certification authority (CA) are true?
Each correct answer represents a complete solution. Choose two.
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
•Network diagrams of the we-are-secure infrastructure
•Source code of the security tools
•IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
Which of the following are the ways of sending secure e-mail messages over the Internet?
Each correct answer represents a complete solution. Choose two.
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
Which of the following is not a level of military data-classification system?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?
Which of the following is a technique used to attack an Ethernet wired or wireless network?
Which of the following encryption methods comes under symmetric encryption algorithm?
Each correct answer represents a complete solution. Choose three.
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?