Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts?

A.

Spiral

B.

Prototyping

C.

View

D.

Waterfall

You are a project manager for a recycling company. You are in the process of reviewing proposals from sellers for recycling equipment. You notice the scope statement states the company required to abide by the environmental agencies regulations regarding waste. As a result, you select proposals that automatically include features such as scrubbers and baghouses to reduce hazardous waste. Which of the following is true regarding the scope statement?

A.

It includes an introductory schedule management plan.

B.

Knowing the limits and the projects required helps determine the resources to purchase.

C.

It is a deliverable-oriented collection of project components.

D.

It is the methods and procedures an organization must follow to create the activity list.

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

A.

Install a host-based IDS

B.

Enable verbose logging on the firewall

C.

Install a DMZ firewall

D.

Install a network-based IDS

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

Using Off-channel verification.

B.

Using Secret keys for authentication.

C.

Using basic authentication.

D.

Using public key infrastructure authentication.

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

A.

Malware protection

B.

Firewall

C.

Automatic updating

D.

Other security settings

Which of the following are the algorithms contained by the digital signature policy?

Each correct answer represents a complete solution. Choose all that apply.

A.

Information validation

B.

Signing

C.

Signature verifying

D.

Key Generation

Which of the following features is used to generate spam on the Internet by spammers and worms?

A.

AutoFill

B.

SMTP relay

C.

Server Message Block (SMB) signing

D.

AutoComplete

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Which of the following is the process of rewriting source and destination addresses of IP packets as they pass through a router or firewall?

A.

NAT

B.

Supernetting

C.

SNAT

D.

PAT

Which type of attack is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs?

A.

Bluesnarfing

B.

Bluebugging

C.

Blue Jacking

D.

Bluecast

US Garments wants all encrypted data communication between corporate office and remote location. They want to achieve following results:

• Authentication of users

• Anti-replay

• Anti-spoofing

• IP packet encryption

They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose all that apply.

A.

Authentication of users

B.

Anti-spoofing

C.

Anti-replay

D.

IP packet encryption

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

A.

Building up an incident response kit

B.

Setting up the initial position after an incident

C.

Working with QA to validate security of the enterprise

D.

Organizing a solution to remove an incident

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

A.

Cost

B.

Schedule

C.

Contract

D.

Resources

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain