Which of the following refers to going through someone's trash to find out useful or confidential information?
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
Which of the following are the examples of administrative controls?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
Which of the following access control models uses a role based method to determine access rights and permission?
Which of the following is the most secure authentication method?
What does the Internet encryption and authentication system named RSA stand for?
In which of the following attacks does an attacker send a spoofed TCP SYN packet in which the target's IP address is filled in both the source and destination fields?
Which of the following languages enable programmers to store cookies on client computers?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols is used to establish a secure TELNET session over TCP/IP?
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:
This rule can help him protect the We-are-secure server from the __________.
Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?