Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails. Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

A.

/var/log/mailog

B.

/var/log/logmail

C.

/log/var/mailog

D.

/log/var/logd

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

An auditor assesses the database environment before beginning the audit. This includes various key tasks that should be performed by an auditor to identify and prioritize the users, data, activities, and applications to be monitored. Which of the following tasks need to be performed by the auditor manually?

A.

Classifying data risk within the database systems

B.

Monitoring data changes and modifications to the database structure, permission and user changes, and data viewing activities

C.

Analyzing access authority

D.

Archiving, analyzing, reviewing, and reporting of audit information

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

A.

IPChains

B.

Tripwire

C.

Hunt

D.

Ethercap

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

(Choose two)

A.

WPA2 -EAP

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Which of the following encryption encoding techniques is used in the basic authentication method?

A.

HMAC_MD5

B.

Md5

C.

DES (ECB mode)

D.

Base64

Which of the following are HTML tags, used to create a table?

A.

B.

C.

D.

E.

F.

, , and
tags. The tag designs the table layout, the tag is used to create a row, and the
tag is used to create a column. For example, the following code generates a table with two rows and two columns:

Cell 1 Cell 2
Cell 3 Cell 4

Answer: C, E, and D are incorrect. There are no HTML tags such as

, , and .

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. You run the following command for a router interface: show interface serial0 You get the following output: Serial0 is administratively down, line protocol is down What will be your conclusion after viewing this output?

A.

There is a physical problem either with the interface or the cable attached to it.

B.

The router has no power.

C.

There is a problem related to encapsulation.

D.

The interface is shut down.

Which of the following statements about a perimeter network are true? (Choose three)

A.

It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall.

B.

It has a connection to a private network through an external firewall and a connection to an internal network through an interior firewall.

C.

It is also known as a demilitarized zone or DMZ.

D.

It prevents access to the internal corporate network for outside users.

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. He wants to use frames in the Web site. Which of the following is an HTML tag used to create frames?

A.

B.

C.

D.