Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following statements about Diffie-Hellman encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about service pack are true?
Each correct answer represents a complete solution. Choose two.
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
Which of the following access control models uses a role based method to determine access rights and permission?
Which of the following are used to suppress paper or wood fires?
Each correct answer represents a complete solution. Choose two.
Which of the following is the default port for the NetBIOS name service?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Which of the following is the process of overwriting all addressable locations on a disk?
Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?
Which of the following terms is used for securing an operating system from an attack?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:
Which of the following tools is John recommending for disk encryption on the We-are-secure server?
Which of the following access control models are used in the commercial sector?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about smurf is true?
Which of the following defines the communication link between a Web server and Web applications?