Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.

A.

Social engineering

B.

Bluesnarfing

C.

SQL injection attack

D.

Bluebug attack

E.

Cross site scripting attack

In which of the following does a Web site store information such as user preferences to provide customized services to users?

A.

ActiveX control

B.

Keyword

C.

Protocol

D.

Cookie

Which of the following statements about RSA algorithm are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a block cipher in which plain text and cipher text are integers between 0 and n-1.

B.

It is a stream cipher in which plain text and cipher text are integers between 0 and n-1.

C.

It is an asymmetric algorithm.

D.

It is a symmetric algorithm.

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?

Each correct answer represents a part of the solution. Choose two.

A.

Implement NAT.

B.

Upgrade your class C network to a class B network.

C.

Add a router to your network.

D.

Add a bridge to your network.

E.

Apply for more IP addresses for your LAN.

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Which of the following works at the network layer and hides the local area network IP address and topology?

A.

Hub

B.

MAC address

C.

Network address translation (NAT)

D.

Network interface card (NIC)

Which of the following is an authentication protocol?

A.

LDAP

B.

PPTP

C.

TLS

D.

Kerberos

Which of the following occurs when a packet is sent from a source computer to a destination computer?

A.

Broadcast transmission

B.

Unicast transmission

C.

Multicast transmission

D.

Baseband transmission

Which of the following are the common roles with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose all that apply.

A.

User

B.

Owner

C.

Custodian

D.

Security auditor

E.

Editor

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

A.

HTTPS

B.

PPTP

C.

L2TP

D.

SMTP

Which of the following access control models uses a predefined set of access privileges for an object of a system?

A.

Policy Access Control

B.

Mandatory Access Control

C.

Role-Based Access Control

D.

Discretionary Access Control

At which of the following OSI model layers does the IPSec protocol work?

A.

Network layer

B.

Application layer

C.

Physical layer

D.

Data-link layer

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

D.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"