Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Trademark

B.

Patent

C.

Trade secret

D.

Copyright

Which of the following statements about Diffie-Hellman encryption are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses only a private key.

B.

It uses both a public key and a private key.

C.

It does not authenticate the parties involved.

D.

It was developed in 1976.

Which of the following statements about service pack are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a medium by which product updates are distributed.

B.

It is a term used for securing an operating system.

C.

It is a term generally related to security problems in a software.

D.

It is a collection of Fixes and Patches in a single product.

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

A.

Session splicing attack

B.

Evasion attack

C.

Insertion attack

D.

Polymorphic shell code attack

Which of the following access control models uses a role based method to determine access rights and permission?

A.

Discretionary access control

B.

Roaming access control

C.

Nondiscretionary access control

D.

Mandatory access control

Which of the following are used to suppress paper or wood fires?

Each correct answer represents a complete solution. Choose two.

A.

Water

B.

Kerosene

C.

CO2

D.

Soda acid

Which of the following is the default port for the NetBIOS name service?

A.

UDP port 137

B.

TCP port 110

C.

UDP port 138

D.

TCP port 119

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.

NSLOOKUP

B.

IPCONFIG

C.

PING

D.

TRACERT

Which of the following is the process of overwriting all addressable locations on a disk?

A.

Sanitization

B.

Authentication

C.

Spoofing

D.

Drive wiping

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Which of the following terms is used for securing an operating system from an attack?

A.

System hacking

B.

System hardening

C.

System mirroring

D.

System indexing

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:

Which of the following tools is John recommending for disk encryption on the We-are-secure server?

A.

CryptoHeaven

B.

Stunnel

C.

TrueCrypt

D.

Magic Lantern

Which of the following access control models are used in the commercial sector?

Each correct answer represents a complete solution. Choose two.

A.

Clark-Wilson model

B.

Clark-Biba model

C.

Bell-LaPadula model

D.

Biba model

Which of the following statements about smurf is true?

A.

It is an ICMP attack that involves spoofing and flooding.

B.

It is a UDP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Which of the following defines the communication link between a Web server and Web applications?

A.

PGP

B.

CGI

C.

IETF

D.

Firewall