Which of the following access control models are used in the commercial sector?
Each correct answer represents a complete solution. Choose two.
Answer : A,D
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
Gathering information -
Determining the network range -
Identifying active systems -
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Answer : C
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?
Answer : D
Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?
Answer : A
Mark works as a Network Administrator for NetTech Inc. The company has a Windows
2000 domain-based network. Users report that they are unable to log on to the network.
Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
Answer : D
Which of the following are tunneling protocols?
Each correct answer represents a complete solution. Choose two.
Answer : C,D
security system
are true?
Each correct answer represents a complete solution. Choose two.
Answer : B,C
Which of the following are ensured by the concept of integrity in information system security?
Each correct answer represents a complete solution. Choose two.
Answer : A,B
You work as a Network Administrator for Net World International. The company has a
Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run
Windows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared Key authentication?
Answer : C
You work as a Network Administrator for Infonet Inc. The company's network has an FTP server.
You want to secure the server so that only authorized users can access it. What will you do to accomplish this?
Answer : B
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.
Answer : A
Which of the following is a source port forwarder and redirector tool?
Answer : A
policy is true?
Answer : C
Which of the following methods backs up all changes made since the last full or normal backup?
Answer : C
is true?
Answer : C