Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following processes are involved under the COBIT framework?

A.

Managing the IT workforce.

B.

Correcting all risk issues.

C.

Conducting IT risk assessments.

D.

Developing a strategic plan.

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Which of the following are the disadvantages of Dual-Homed Host Firewall Architecture?

A.

It can provide services by proxying them.

B.

It can provide a very low level of control.

C.

User accounts may unexpectedly enable services a user may not consider secure.

D.

It provides services when users log on to the dual-homed host directly.

Which of the following functions are performed by methods of the HttpSessionActivationListener interface?

A.

Notifying an attribute that a session has just migrated from one JVM to another.

B.

Notifying the object when it is unbound from a session.

C.

Notifying the object when it is bound to a session.

D.

Notifying an attribute that a session is about to migrate from one JVM to another.

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

A.

Tiny

B.

NetBus

C.

Trojan Man

D.

EliteWrap

Which of the following protocols is the mandatory part of the WPA2 standard in the wireless networking?

A.

CCMP

B.

ARP

C.

WEP

D.

TKIP

You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?

A.

Buesnarfing

B.

The evil twin attack

C.

WAP cloning

D.

DOS

Which of the following statements about the element are true?

A.

It has as one of its sub-elements.

B.

If there is no sub-element, no HTTP method will be constrained.

C.

It can have at the most one sub-element.

D.

It is a sub-element of the element.

Which of the following backup sites takes the longest recovery time?

A.

Mobile backup site

B.

Warm site

C.

Cold site

D.

Hot site

Which of the following methods can be helpful to eliminate social engineering threat? (Choose three)

A.

Data encryption

B.

Data classification

C.

Password policies

D.

Vulnerability assessments