Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which key of the Asymmetric encryption is used to encrypt the data when a user sends a message or data to another user?

A.

Symmetric

B.

Private

C.

Public

D.

Asymmetric

The Project Scope Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

A.

Create Work Breakdown Structure (WBS)

B.

Control Scope

C.

Select Sellers

D.

Verify Scope

You work as an IT Technician for PassGuide Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

A.

MAC Filtering

B.

RAS

C.

WEP

D.

SSID

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

File-based

B.

Anomaly-based

C.

Signature-based

D.

Network-based

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

A.

Stealth virus

B.

Multipartite virus

C.

File virus

D.

Polymorphic virus

E.

Boot sector virus

Which of the following wireless security features provides the best wireless security mechanism?

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WEP

D.

WPA

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

portsentry

B.

nmap

C.

scanlogd

D.

libnids

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

A.

Mandatory Access Control (MAC)

B.

Access control entry (ACE)

C.

Mandatory Integrity Control (MIC)

D.

Security Identifier (SID)

PsPasswd is a tool used by network administrators to change an account password on the local or remote system. Which of the following are the command syntaxes used by the PsPasswd tool?

Each correct answer represents a complete solution. Choose all that apply.

A.

-t

B.

-u

C.

username

D.

NewPassword

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

A.

VPN

B.

Intranet

C.

Extranet

D.

WEP

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network environment. The network contains a Cisco Catalyst router to connect the internal network to the Internet. You want to secure your network from various attacks such as virus, spam, spyware, phishing, etc. You want to secure the whole network through a separate hardware device. Which of the following will you use?

A.

PIX-Firewall

B.

IDS

C.

IPS

D.

ASA

Which of the following tasks can be performed by a malicious bot/botnet?

Each correct answer represents a complete solution. Choose all that apply.

A.

Harvesting email addresses from contact forms or guestbook pages.

B.

Performing a spoofing attack.

C.

Downloading entire Web site to suck the bandwidth of a target.

D.

Stealing various information like credit card numbers, login, ids, etc.

E.

Performing DDoS attacks.

You work as a Network Administrator for PassGuide Inc. Adam, your assistant, wants to perform a backup of the server. Which of the following authentication methods will you assign to Adam?

A.

RBAC

B.

OrBAC

C.

DAC

D.

NAC

You are a project manager who is completing a project for another organization. The project you are managing will have phased deliverables throughout the project. Stakeholders are required to complete scope validation at the end of each phase so that the project can move forward. Your payment requests will also be attached to the approval of each phase so it is important to you, on several levels, that the stakeholders participate in scope validation as soon as they are requested. You have documented the process for reviewing the product acceptance criteria with the stakeholders.

What project document details the product acceptance criteria in all the projects?

A.

Statement of Work

B.

Project scope statement

C.

Project management plan

D.

Contract

Which of the following documents is described in the statement below?

"It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

A.

Risk register

B.

Quality management plan

C.

Project charter

D.

Risk management plan