Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

A.

Examining your antivirus logs

B.

Examining your domain controller server logs

C.

Examining your firewall logs

D.

Examining your DNS Server logs

Samantha works as a Web Developer for XYZ CORP. She is designing a Web site for the company. In a Web page, she uses the HTTP-EQUIV attribute to control the page cache. Which of the following HTTP-EQUIV values controls the page cache in the browser folder?

A.

Window-target

B.

Status-code

C.

Content-type

D.

Pragma

Which of the following statements is NOT true about FAT16 file system?

A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

B.

FAT16 file system supports file-level compression.

C.

FAT16 does not support file-level security.

D.

FAT16 file system supports Linux operating system.

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

A.

Sam Spade

B.

John the Ripper

C.

Cheops-ng

D.

AiroPeek

Which of the following applications work as mass-emailing worms? (Choose two)

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Nimda virus

D.

Melissa virus

Which of the following statements about data integrity of a container are true? (Choose two)

A.

It ensures that a hacker cannot alter the contents of an HTTP message while it is in transit from a container to a client.

B.

Data integrity ensures that information is made available to users who are authorized to access it.

C.

Data integrity ensures that information has not been modified by a third party while it is in transit.

D.

It ensures that an eavesdropper cannot read an HTTP message being sent from a client to a container.

John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company. Which of the following can be the purpose of this analysis? (Choose three)

A.

To ensure absolute safety during the audit

B.

To analyze exposure to risk in order to support better decision-making and proper management of those risks

C.

To try to quantify the possible impact or loss of a threat

D.

To assist the auditor in identifying the risks and threats

Which of the following is required by a Web-based application to connect to a database?

A.

DSN

B.

DNS

C.

CGI

D.

FQDN

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

Which of the following firewalls inspects the actual contents of packets?

A.

Circuit-level firewall

B.

Stateful inspection firewall

C.

Packet filtering firewall

D.

Application-level firewall