11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

A.

Your public key

B.

The recipient's private key

C.

The recipient's public key

D.

Your private key

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

A.

Disable ActiveX Controls

B.

Disable Active Scripting

C.

Implement File Integrity Auditing

D.

Configure Security Logs

Fill in the blank with the appropriate term.

NOTE. Do not use abbreviation.

________ is a configurable client identification that allows a client to communicate with a particular base station.

An organization has a standardized change management plan that all project managers must adhere to. A project manager has worked with the Change Control Board in his organization to approve a change to project scope. What should the standardized change management plan require the project manager to do with the approved scope change?

A.

Perform risk assessment on the new change.

B.

Communicate the change to the vendor.

C.

Create a cost estimate for the change.

D.

Update the WBS.

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy?

A.

Create a GPO.

Configure Audit Object Access.

Attach the GPO to the domain.

B.

Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file.

C.

Enable debug logging on the DNS server.

D.

Create a new OU.

Move the DNS server account to the OU.

Create a GPO.

Configure Audit Logon events.

Attach the GPO to the OU.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?

A.

RSA

B.

Diffie-Hellman

C.

Twofish

D.

Blowfish

You are the program manager for your organization. You have proposed a program that will cost $750,000 and will last for four years. Management is concerned with the cost of the program in relation to the return your program will bring. If the rate of return is six percent what is the minimum value your project should return in four years based on the investment of the program?

A.

$795,000

B.

$750,001

C.

$946,857

D.

$750,000

Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?

A.

Proxy server

B.

Domain tasting

C.

NMap

D.

PsPasswd

Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open issues in the project and how the resolution of the issues may lead to additional project changes. On what document are Tomas and the stakeholders working in this scenario?

A.

Change management plan

B.

Communications management plan

C.

Issue log

D.

Risk management plan

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Strong encryption

B.

Fiber-optic cable

C.

Firewall

D.

Strong password

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

A.

Steg-Only Attack

B.

Stegdetect Attack

C.

Active Attacks

D.

Chosen-Stego Attack

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He wants to test the response of a DDoS attack on the we-are-secure server. To accomplish this, he takes the following steps:

Instead of directly attacking the target computer, he first identifies a less secure network named Infosecure that contains a network of 100 computers.

He breaks this less secure network and takes control of all its computers. After completing this step, he installs a DDoS attack tool on each computer of the Infosecure network.

Finally, he uses all the computers of the less secure network to carry out the DDoS attack on the we-are-secure server.

Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Stacheldraht

B.

Trin00

C.

TFN

D.

BackOfficer Friendly

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is an IPSec protocol.

B.

It is a text-based communication protocol.

C.

It uses TCP port 22 as the default port and operates at the application layer.

D.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

A.

Corrupted or missing files.

B.

Sudden reduction in system resources.

C.

Faster read/write access of the CD-ROM drive.

D.

Unclear monitor display.