Which of the following port numbers is used by the LDAP protocol when it is secured?
Which of the following tools can be used to perform polymorphic shell code attacks?
Which of the following are symptoms of a virus attack on your computer?
Each correct answer represents a complete solution. Choose two.
Which of the following is used to indicate that the project team has decided not to change the project management plan to deal with a risk or is unable to identify any other suitable response strategy?
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.
Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
Which type of DNS zone is a read-only copy of the primary DNS zone?
Which of the following contains information that is read by a Web application whenever a user visits a site?
Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?
Which of the following authentication methods is used to enable a Web browser to provide credentials when making a request during an HTTP transaction?
Which of the following is a structured review of the procurement process originated at the Plan Procurements process?
John works as a network security officer in Gentech Inc. The company uses a TCP/IP network. While working on the network, a problem occurs related to the DNS resolution. Which of the following utilities can he use to diagnose the problem?
Which of the following RAID levels is supported by an operating system?
Which of the following standards is also known as IEEE 802.11i?
Which of the following is a cryptographic approach employed by many cryptographic algorithms and cryptosystems?