Which of the following types of virus is capable of changing its signature to avoid detection?
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
Which of the following is NOT a countermeasure against a spoofing attack?
Identify whether the given statement is true or false.
"Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords."
You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?
How many keys are used to encrypt data in symmetric encryption?
Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?
Which of the following statements about certification authority (CA) are true?
Each correct answer represents a complete solution. Choose two.
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
•Network diagrams of the we-are-secure infrastructure
•Source code of the security tools
•IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?
Key escrow is a method of __________.
Which of the following statements about packet filtering is true?
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?
Which of the following technologies are forms of single sign-on (SSO)?
Each correct answer represents a complete solution. Choose three.
Which of the following protocols is used to send e-mails on the Internet?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?
Which of the following encryption algorithms are based on stream ciphers?
Each correct answer represents a complete solution. Choose two.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?
Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?
At which of the following layers Structured Query Language (SQL) works?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:
This rule can help him protect the We-are-secure server from the __________.
Which of the following statements about the One Time Password (OTP) security system are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about DMZ is true?
Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?
Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
Which of the following is the process of overwriting all addressable locations on a disk?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:
Which of the following tools is John recommending for disk encryption on the We-are-secure server?
Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?
Which of the following are the benefits of information classification for an organization?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the differences between PPTP and L2TP?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about digital signature is true?
Which of the following protocols is used to verify the status of a certificate?
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
Which of the following statements are true about a Gantt chart?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following have been developed to address security issues in the e-commerce system?
Each correct answer represents a complete solution. Choose two.
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
Which of the following are the goals of the cryptographic systems?
Each correct answer represents a complete solution. Choose three.
You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?
Which of the following statements about system hardening are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is ensured by the concept of availability in information system security?
Which of the following is an attack with IP fragments that cannot be reassembled?
Which of the following are the goals of risk management?
Each correct answer represents a complete solution. Choose three.
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Which of the following processes is known as Declassification?
Which of the following are politically motivated threats that an organization faces?
Each correct answer represents a complete solution. Choose all that apply.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?
Which of the following protects from electrical and magnetic induction that causes interference to the power voltage?
In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?
Which of the following classes of fire comes under Class C fire?
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following statements about biometric authentication is true?
Which of the following protocols implements VPN using IPSec?
Which of the following is an authentication protocol?
Which of the following command-line utilities queries the DNS server to check whether or not the zone database contains the correct information?
Which of the following is a signature-based intrusion detection system (IDS) ?
Which of the following refers to a program that allows access to a system by skipping the security checks?
You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?
Each correct answer represents a complete solution. Choose all that apply.
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
Which of the following is the best method to stop vulnerability attacks on a Web server?
Which of the following statements is true about transient noise?
Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?
In which type of access control do user ID and password system come under?
Which of the following can provide security against man-in-the-middle attack?
Which of the following types of attacks occurs when attackers enter a system or capture network traffic and make changes to selected files or data packets?
Which of the following statements about packet filtering is true?
The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?
Which of the following refers to the emulation of the identity of a network computer by an attacking computer?
How long are cookies in effect if no expiration date is set?
Which of the following statement about snooping is true?
Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
Which of the following types of fire comes under Class K fire?
Which of the following tools or services is used to find the entire IP address range used by an organization?
Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?
Which authentication method uses retinal scanners for authentication process?
Which of the following actions might cause a privacy breach while surfing the Internet?
Which of the following encryption strengths is used to secure NTLM version 2 passwords?
Which of the following is the default port for Secure Shell (SSH)?
Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?
Which of the following components come under the network layer of the OSI model?
Each correct answer represents a complete solution. Choose two.
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?
Which of the following ports is used by a BOOTP server?
Which of the following is not a level of military data-classification system?
Which of the following is not a level of military data-classification system?
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Which of the following IP addresses are private addresses?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?
Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?
Which of the following are tunneling protocols?
Each correct answer represents a complete solution. Choose two.
Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?
At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?