Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Which of the following technologies are forms of single sign-on (SSO)?

Each correct answer represents a complete solution. Choose three.

A.

CoSign

B.

Kerberos

C.

RADIUS

D.

SESAME

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

A.

Fraggle

B.

Ping of death

C.

Jolt

D.

Teardrop

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

A.

Flooding

B.

Snooping

C.

Phishing

D.

Spoofing

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 1030

B.

18 U.S.C. 1028

C.

18 U.S.C. 2510

D.

18 U.S.C. 1029

Which of the following statements about symmetric encryption are true?

Each correct answer represents a complete solution. Choose three.

A.

It is best suited for encrypting large amount of data.

B.

It is used by Data Encryption Standard (DES) to encrypt data.

C.

It uses two keys - a public key and a private key pair for data encryption.

D.

It is a relatively fast encryption method than public key encryption.

Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?

A.

Hotfix

B.

Buffer overflow

C.

Biometrics

D.

Spam

Which of the following statements best describes VeriSign?

A.

It is an authentication server.

B.

It is a certification authority.

C.

It is an encryption technology.

D.

It is a signature verification utility.

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Which of the following access control models requires centralize database of user accounts?

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

A.

SSL

B.

TLS

C.

PGP

D.

EAP

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Blowfish

B.

DES

C.

RC4

D.

IDEA

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

A.

Shielding

B.

Eavesdropping

C.

Spoofing

D.

Packaging

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

A.

Encryption

B.

Security audit log

C.

Access control list

D.

Ciphering

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

A.

Power distribution outages

B.

Civil disobedience

C.

Riot

D.

Vandalism

E.

Terrorist attacks