Which of the following is a reason to implement security logging on a DNS server?
Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
Which of the following is ensured by the concept of availability in information system security?
Which of the following is a program that monitors data packets traveling across a network?
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?
Which of the following are the goals of the cryptographic systems?
Each correct answer represents a complete solution. Choose three.
Which of the following is used for secure financial transactions over the Internet?
Which of the following protocols provides maintenance and error reporting function?
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?
Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company.
To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?
Which of the following protocols work at the Network layer of the OSI model?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |