Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Which of the following is not a man-made threat?

A.

Tidal wave

B.

Vandalism

C.

Terrorism

D.

Theft

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

A.

Network anti-spyware software

B.

Network anti-virus software

C.

Site surveys

D.

Protocol analyzers

Which networking protocol is used to authenticate users or devices before granting them access to a network?

A.

IPSec

B.

PAgP

C.

RADIUS

D.

SRP

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A.

IFB

B.

RFP

C.

RFI

D.

RFQ

During which of the following processes, probability and impact matrix is prepared?

A.

Perform Quantitative Risk Analysis

B.

Plan Risk Responses

C.

Monitoring and Control Risks

D.

Perform Qualitative Risk Analysis

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

A.

Asymmetric encryption

B.

Database encryption

C.

XML encryption

D.

Symmetric encryption

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

A.

The Change Manager

B.

The IT Security Manager

C.

The Configuration Manager

D.

The Service Level Manager

Fill in the blank with the appropriate type of router.

A _________ router performs packet-filtering and is used as a firewall.

Which of the following is a read-only copy of a zone and obtains its resource records from other name servers?

A.

Secondary zone

B.

Primary zone

C.

Stub zone

D.

SOA zone

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

A.

RSA

B.

TripleDES

C.

DES

D.

AES

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

A.

VPN

B.

Extranet

C.

Intranet

D.

WEP

Which of the following is NOT a principle and practice of the 'Minimize the number of highconsequence targets' principle?

A.

Principle of least privilege

B.

Principle of separation of privileges, duties, and roles

C.

Principle of separation of domains

D.

Principle of trusted entities from untrusted entities

Which of the following is NOT an input of the Administer Procurements process?

A.

Contract

B.

Requirements traceability matrix

C.

Procurement management plan

D.

Procurement documents

E.

Work performance information

Which of the following is a cryptographic approach employed by many cryptographic algorithms and cryptosystems?

A.

Symmetric-key cryptography

B.

Public-key cryptography

C.

Asymmetric-key cryptography

D.

Quantum cryptography