Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are the project manager of the NJJ project. Your enterprise environmental factors require that you establish certain risk management rules regarding low risks within your project. What is the best policy for risks with low probability and low impact in the project management?

A.

These risks should be placed in the risk register.

B.

These risks should be identified, but dismissed.

C.

These risks should be accepted.

D.

These risks should be placed on a watchlist for future monitoring.

In the image of the Screened Host Firewall Architecture given below, select the element that is commonly known as the access router.

A.

Which of the following tools can be used to read NetStumbler's collected data files and present street maps showing the logged WAPs as icons, whose color and shape indicates WEP mode and signal strength?

A.

NetStumbler

B.

WEPcrack

C.

StumbVerter

D.

Kismet

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

A.

Dictionary attack

B.

Man-in-the-middle attack

C.

Denial-of-service attack

D.

Password guessing attack

Adam works as a Penetration Tester for Umbrella Inc. He is assigned a project of testing the security of the company's network. He is using the Metasploit Framework for developing and executing exploit code against a remote target machine. The Metasploit Framework is the important sub-project of the Metasploit Project. Which of the following are the other sub-projects under the Metasploit projet?

Each correct answer represents a complete solution. Choose all that apply.

A.

shellcode archive

B.

Metasploit system

C.

Opcode Database

D.

security research

You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required. Which of the following are the steps you should take to secure network printers?

Each correct answer represents a complete solution. Choose two.

A.

Remove the printers from the network and do not allow remote printing.

B.

Ensure that the printers hard drive is scanned for spyware.

C.

Secure all remote administrative protocols such as telnet.

D.

Do not allow duplicate print jobs.

E.

Limit the size of print jobs on the printer.

Which of the following statements about a certification authority (CA) is true?

A.

It is a non-profit organization that sets security standards for e-commerce.

B.

It issues physical certificates that confirm the identity of entities.

C.

It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

D.

It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

You work as a Software Developer for PassGuide Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

A.

Cryptosystem

B.

Cryptographer

C.

Cryptographic toolkit

D.

Cryptanalyst

You are the project manager for the GHY Organization. A stakeholder has presented a change to your project that will cause the project scope to increase considerably. You are considering the change for approval and you need to review the impact of the change on all areas of the project. What change control system component is responsible for guiding the review of the impact of all changes on the project management knowledge areas?

A.

Scope change control system

B.

Change control system

C.

Configuration management

D.

Integrated change control

Which of the following authentication methods is used to enable a Web browser to provide credentials when making a request during an HTTP transaction?

A.

Anonymous authentication

B.

Basic authentication

C.

Digest authentication

D.

Integrated Windows authentication

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

A.

File integrity auditing

B.

Reconnaissance

C.

Spoofing

D.

Shoulder surfing

You are working in a functional organization and are managing the IHH Project. Your project will likely last for six months and has a budget constraint of $1,876,000. You'll be dealing with a functional manager to manage costs and resources in the project. Who will have authority over assigning the project team members to activities?

A.

Customers

B.

Project sponsor

C.

Functional manager

D.

Team leader

You are configuring IPS (Intrusion Prevention System) on a Cisco IOS router. The IPS Policy Wizard window opens when you confirm the SDEE messages. Which of the following tasks can you perform using the IPS Policy Wizard window?

Each correct answer represents a complete solution. Choose all that apply.

A.

Select the direction of traffic for inspecting the events.

B.

Select an encryption method to improve security.

C.

Select the interface for applying the IPS rule.

D.

Select the SDF file which a user can use.

Which of the following are outputs of the Direct and Manage Project Execution process?

Each correct answer represents a complete solution. Choose all that apply.

A.

Change requests

B.

Deliverables

C.

Project staff assignments

D.

Work performance information

Which of the following malware spread through the Internet and caused a large DoS attack in 1988?

A.

LoveLetter worm

B.

Klez worm

C.

Morris worm

D.

SQL slammer worm