Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

A.

Collusion

B.

Eavesdropping

C.

Buffer overflow

D.

Phishing

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

A.

SYN attack

B.

Spoofing

C.

PING attack

D.

Brute force attack

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

A.

Web caching

B.

Hacking

C.

Packet filtering

D.

Spoofing

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

A.

32

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rainbow table

B.

Rootkit

C.

Access control list

D.

Backdoor

Which of the following statements about active attack is true?

A.

It does not insert false packets into the data stream.

B.

It makes the computer's network services unavailable.

C.

It inserts false packets into the data stream.

D.

It locks out the users' accounts.

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

A.

transport

Which of the following is the best way of protecting important data against virus attack?

A.

Updating the anti-virus software regularly.

B.

Taking daily backup of data.

C.

Using strong passwords to log on to the network.

D.

Implementing a firewall.

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

A.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

B.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

C.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

D.

Digest authentication is a more secure authentication method as compared to Basic authentication.

Which of the following have been developed to address security issues in the e-commerce system?

Each correct answer represents a complete solution. Choose two.

A.

Digital cash

B.

Encryption frameworks

C.

Shopping cart

D.

Digital signatures

Which of the following statements about Network Address Translation (NAT) are true?

Each correct answer represents a complete solution. Choose two.

A.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

B.

It reduces the need for globally unique IP addresses.

C.

It allows external network clients access to internal services.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Which of the following languages enable programmers to store cookies on client computers?

Each correct answer represents a complete solution. Choose two.

A.

Perl

B.

DHTML

C.

JavaScript

D.

HTML

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Extensible Authentication Protocol (EAP)

C.

Open Shortest Path First (OSPF)

D.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?

A.

PAP

B.

MS-CHAP

C.

CHAP

D.

MS-CHAP v2