Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Fill in the blank with the appropriate act name.

The ____act gives consumers the right to ask emailers to stop spamming them.

Which of the following tools allow you to perform HTTP tunneling?

Each correct answer represents a complete solution. Choose all that apply.

A.

BackStealth

B.

HTTPort

C.

Tunneled

D.

Nikto

Which of the following TCSEC classes defines verified protection?

A.

Class B

B.

Class D

C.

Class A

D.

Class C

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Public key certificate for server authentication

B.

Password hash for client authentication

C.

Strongest security level

D.

Dynamic key encryption

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

A.

WPA2

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Which of the following Trojans does not use TCP protocol?

A.

Donald Dick

B.

Beast

C.

Back Oriffice

D.

NetBus

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

A.

Insertion

B.

Evasion

C.

Fragmentation overwrite

D.

Fragmentation overlap

Which of the following is the default port value of beast Trojan?

A.

6666

B.

2222

C.

3333

D.

1111