Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?

A.

IWA

B.

Digest authentication

C.

MPA

D.

SPAP

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The site should restrict the number of login attempts to only three times.

B.

The site should increase the encryption key length of the password.

C.

The site should use CAPTCHA after a specific number of failed login attempts.

D.

The site should force its users to change their passwords from time to time.

Which of the following options is an approach to restricting system access to authorized users?

A.

MIC

B.

DAC

C.

RBAC

D.

MAC

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

A.

I LOVE YOU

B.

Melissa

C.

Klez

D.

Boot sector

Which of the following can provide security against man-in-the-middle attack?

A.

Strong authentication method

B.

Firewall

C.

Strong data encryption during travel

D.

Anti-virus programs

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

A.

DNS zone transfer

B.

SNMP enumeration

C.

IIS buffer overflow

D.

NetBIOS NULL session

All of the following are the outputs of the Acquire Project Team process except for which one?

A.

Resource calendars

B.

Enterprise environmental factors

C.

Project staff assignments

D.

Project management plan updates

What does noise in a power line indicate?

A.

Power degradation that is low and less than normal

B.

Interference superimposed onto the power line

C.

Momentary high voltage

D.

Prolonged loss of power

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

HTTP

B.

TLS

C.

SNMP

D.

SSL

Which of the following attacks can be performed by Brutus for cracking a password?

Each correct answer represents a complete solution. Choose two.

A.

Hybrid attack

B.

Replay attack

C.

Brute force attack

D.

Man-in-the-middle attack

Which of the following is a model that uses a predefined set of access privileges for an object of the system?

A.

Mandatory Access Control (MAC)

B.

Discretionary Access Control (DAC)

C.

Policy Access Control (PAC)

D.

Role-Based Access Control (RBAC)

Which of the following is a DNS database resource record containing the host DNS name and the IPv6 address?

A.

AAAA

B.

IPv6

C.

Bzip2

D.

HOST

Which of the following is a process of monitoring data packets that travel across a network?

A.

SCP protocol

B.

Packet sniffing

C.

Rootkit

D.

ICMP

Which of the following heights of fence deters only casual trespassers?

A.

3 to 4 feet

B.

8 feet

C.

2 to 2.5 feet

D.

6 to 7 feet

Which is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?

A.

Honeynet

B.

Honeypot

C.

Honeytrap

D.

Honeytoken