Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

A.

Ciphertext only attack

B.

Chosen ciphertext attack

C.

Known plaintext attack

D.

Chosen plaintext attack

Which of the following protocols work at the Network layer of the OSI model?

A.

Routing Information Protocol (RIP)

B.

Internet Group Management Protocol (IGMP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

Which of the following protocols implements VPN using IPSec?

A.

PPP

B.

L2TP

C.

PPTP

D.

SLIP

Which of the following terms refers to the process in which headers and trailers are added around user data?

A.

Encryption

B.

Encapsulation

C.

Authentication

D.

Authorization

Which of the following statements about a bastion host is true?

A.

It is a computer that is used to resolve the NetBIOS name to an IP address.

B.

It is a computer that is used to resolve the host name to an IP address.

C.

It is a computer that is accessible from the Internet to collect information about internal networks.

D.

It is a computer that must be made secure because it is accessible from the Internet and hence is more vulnerable to attacks.

Which of the following provides high availability of data?

A.

RAID

B.

Anti-virus software

C.

Backup

D.

EFS

Which of the following statements about Microsoft hotfix are true?

Each correct answer represents a complete solution. Choose two.

A.

It is the term used by Microsoft for major service pack releases.

B.

It is generally related to security problems.

C.

It is a collection of files used by Microsoft for software updates released between major service pack releases.

D.

It is generally related to the problems of a Web server's performance.

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet.

For security, you want to restrict unauthorized access to the network with minimum administrative effort.

You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Connect a brouter to the network.

B.

Implement firewall on the network.

C.

Connect a router to the network.

D.

Implement a proxy server on the network.

Which of the following are intrusion detection device?

A.

Fingerprint reader

B.

Smart card reader

C.

Retinal scanner

D.

CCTV

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

A.

Worm

B.

Biometrics

C.

Denial-of-Service (DoS)

D.

Trojan horse

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

A.

HTTPS

B.

HTTP

C.

TELNET

D.

NetBIOS

Which of the following statements best describes VeriSign?

A.

It is a signature verification utility.

B.

It is a certification authority.

C.

It is an encryption technology.

D.

It is an authentication server.

Which of the following conditions the line to keep voltage steady and clean?

A.

Power regulator

B.

Demilitarized zone (DMZ)

C.

Transponder

D.

Smoke detector

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

A.

Macro virus

B.

E-mail virus

C.

Stealth virus

D.

Polymorphic virus

Which of the following statements about IEEE 802.1X standard are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses the Point-to-Point Tunneling Protocol (PPTP) that works on Ethernet, Token Ring, or wireless LANs to exchange messages for the authentication process.

B.

It uses the Extensible Authentication Protocol (EAP) that works on Ethernet, Token Ring, or wireless LANs to exchange messages for the authentication process.

C.

It provides an authentication framework for wireless LANs.

D.

It provides the highest level of VPN security.