Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following characteristics are related to biometrics?

Each correct answer represents a complete solution. Choose two.

A.

Psychological

B.

Biological

C.

Physiological

D.

Behavioral

You are responsible for the security computers in college labs. Since a number of students have significant computer skills, you wish to make security impossible to breach through normal operating system based means. Furthermore, you want to have the security require a password that must be entered before the operating system even loads. What will you do to accomplish the task?

A.

Implement biometric security.

B.

Implement bios security that prevents the system from loading if the correct password is not entered.

C.

Implement an operating system password that prevents the system from loading if the correct password is not entered.

D.

Implement hard drive encryption with a password tied into the operating system password.

David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

A.

Striped volume

B.

Spanned volume

C.

RAID-5 volume

D.

Mirrored volume

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A.

IFB

B.

RFI

C.

RFP

D.

RFQ

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

A.

Code red

B.

Beast

C.

SQL Slammer

D.

Klez

Which of the following attacks does Management Frame Protection help to mitigate?

Each correct answer represents a complete solution. Choose two.

A.

Replay attack

B.

DoS attack

C.

DDoS attack

D.

Man-in-the-middle attack

Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

A.

SWOT analysis

B.

Delphi technique

C.

Isolated pilot groups

D.

Root cause analysis

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

A.

The attacker can exploit any protocol used to go into the internal network or intranet of the company.

B.

The attacker can perform a Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

C.

The attacker can gain access to the Web server in a DMZ and exploit the database.

D.

The attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

You are the project manager of the HQQ Project for your company. You are working with your project stakeholders to discuss the risks in the project that can adversely affect the project objectives. You are discussing the possibilities of causes for an identified risk event in your project. Your stakeholder is confused on the difference between causes and risk events. Which of the following is NOT an example of a cause for a project risk?

A.

Schedule constraints on the project

B.

Limited team members to complete the project work

C.

Quality assurance programs within the company

D.

Work permit requirements

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

A.

Implement a network based IDS.

B.

Implement a passive IDS

C.

Implement a stateful packet inspection firewall.

D.

Implement a honey pot.

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

A.

Stealth

B.

Snow

C.

Blindside

D.

ImageHide

Which of the following RAID levels will you use to implement a RAID system for providing fault tolerance to a database?

A.

RAID 10

B.

RAID 1

C.

RAID 5

D.

RAID 0

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it. Which of the following tools works by placing the host system network card into the promiscuous mode?

A.

Sniffer

B.

THC-Scan

C.

NetStumbler

D.

Snort

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Fill in the blank with the appropriate word.

A_______ is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems.