You are the project manager for the TTR project. You are in the process of gathering information for risk identification. You ask experts to participate in the process through their emails for maintaining anonymity. You collect the responses, summarize them, and are then re-circulated to the experts for further comment. Which of the following techniques are you using for risk identification?
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?
What does noise in a power line indicate?
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?
In which of the following does a Web site store information such as user preferences to provide customized services to users?
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
Which type of repudiation states that the creator of the message denies ever creating the message even after creating it?
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?
Which of the following is used to detect malicious activity such as port scans or even attempts for cracking into computers by monitoring network traffic?
Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?
You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.
You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.
What is the most likely cause?
Which of the following is a physical or logical subnetwork that contains and exposes external services of an organization to a larger network, usually the Internet?
Which of the following malware spread through the Internet and caused a large DoS attack in
1988?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |