Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following options is an approach to restricting system access to authorized users?
Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?
Which of the following can provide security against man-in-the-middle attack?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.
All of the following are the outputs of the Acquire Project Team process except for which one?
What does noise in a power line indicate?
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following attacks can be performed by Brutus for cracking a password?
Each correct answer represents a complete solution. Choose two.
Which of the following is a model that uses a predefined set of access privileges for an object of the system?
Which of the following is a DNS database resource record containing the host DNS name and the IPv6 address?
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following heights of fence deters only casual trespassers?
Which is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?