Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Fill in the blank with the appropriate term.

____________is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies.

Which of the following are some of its critical steps?

Each correct answer represents a complete solution. Choose two.

A.

Awareness and Training Material Effectiveness

B.

Awareness and Training Material Implementation

C.

Awareness and Training Program Design

D.

Awareness and Training Material Development

You work as an Exchange Administrator for McRobert Inc. You are configuring a new Exchange 2000 Server computer and two storage groups, group A and group B, on your network. You have to configure the physical disks on the Exchange 2000 Server computer to provide better performance and availability. Which configuration will you use to achieve this?

A.

Mirrored ---- Transaction Log Files (group A)

Mirrored ---- Transaction Log Files (group B)

RAID5 ------ Information store (groups A and B)

B.

Single drive ---- Transaction Log Files (group A)

Single drive ---- Transaction Log Files (group B)

RAID5 --------- Information Store (groups A and B)

C.

Mirrored ---- Transaction Log Files ( groups A and B)

RAID5 ------ Information Store (groups A and B)

D.

Single drive ----- Transaction Log Files (group A)

Single drive ----- Transaction Log Files (group B)

RAID5 ----------- Information Store (group A)

RAID5 ----------- Information Store (group B)

You work as a Network Administrator for Net World Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. A Public Key Infrastructure (PKI) is installed on a server in the domain. You are planning to go on vacation for two weeks. Your team has three assistant administrators. You are required to accomplish the following tasks:

• Delegate the authority to the assistant administrators to issue, approve, and revoke certificates.

• The solution must involve least administrative burden.

Which of the following steps will you take to accomplish the tasks?

A.

Assign the Certificate Managers role to the assistant administrator user accounts.

B.

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the CA Administrator role to the CertAdmins group.

C.

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the Enterprise Administrators role to the CertAdmins group.

D.

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the Certificate Managers role to the CertAdmins group.

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

A.

Quantitative risk analysis

B.

Seven risk responses

C.

Qualitative risk analysis

D.

A risk probability-impact matrix

You are the project manager of the Workstation Improvement Project for your organization. This project will replace 925 workstations with new computers for your company's employees. Mark Jones, the sales manager, has requested that your project add 250 laptops as part of this project as his employees do not have workstations as they travel as part of the sales process. Mark insists that his department in the company can pay for the cost of the laptops. All of the following are components that will be affected by this change request except for which one?

A.

There will be a need for additional time to install the laptops.

B.

There will be a need for an additional project scope statement because of the change request.

C.

There will be a need for additional procurement management processes.

D.

There will be a need for additional risk analysis for the laptops.

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

A.

Macro virus

B.

Stealth virus

C.

E-mail virus

D.

Polymorphic virus

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

A.

The recipient's public key

B.

Your private key

C.

The recipient's private key

D.

Your public key

Brutus is a password cracking tool that can be used to crack the following authentications:

• HTTP (Basic Authentication)

• HTTP (HTML Form/CGI)

• POP3 (Post Office Protocol v3)

• FTP (File Transfer Protocol)

• SMB (Server Message Block)

• Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Hybrid attack

C.

Man-in-the-middle attack

D.

Brute force attack

E.

Replay attack

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

A.

Auditing

B.

Packet filtering

C.

Authentication

D.

Hacking

You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?

A.

Mitigation

B.

Acceptance

C.

Exploiting

D.

Sharing

Which of the following are the benefits of information classification for an organization?

Each correct answer represents a complete solution. Choose two.

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It helps reduce the Total Cost of Ownership (TCO).

D.

It helps identify which protections apply to which information.

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

A.

In person attack

B.

Third-party authorization attack

C.

Important user posing attack

D.

Impersonation attack

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

A.

SSHGuard

B.

portsentry

C.

OpenSSL

D.

nmap

E.

Fail2Ban

Which of the following terms describes the statement given below?

"It is a service on a computer system (usually a server) that delays incoming connections for as long as possible. The technique was developed as a defense against a computer worm, and the idea is that network abuses, such as spamming or broad scanning, are less effective if they take too long."

A.

Honeytokens

B.

Honeynet

C.

Honeypot

D.

Tarpit