Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.
You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required. Which of the following are the steps you should take to secure network printers?
Each correct answer represents a complete solution. Choose two.
David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?
Which of the following statements are true about WPA?
Each correct answer represents a complete solution. Choose all that apply.
You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email you@gmail.com' and press the submit button. The Web application displays the server error. What can be the reason of the error?
Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.
Adam works as a Penetration Tester for Umbrella Inc. He is assigned a project of testing the security of the company's network. He is using the Metasploit Framework for developing and executing exploit code against a remote target machine. The Metasploit Framework is the important sub-project of the Metasploit Project. Which of the following are the other sub-projects under the Metasploit projet?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?
Which of the following is used to allow or deny access to network resources?
Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?
Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
Which of the following is responsible for assuring the quality of the deliverables in a project?
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?
A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?