Which of the following is not a characteristic of a firewall?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 2
A framework is a fundamental structure used to support and resolve complex issues. The framework
that delivers an efficient set of technologies in order to develop applications which are more secure
in using Internet and Intranet is:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 3
A framework for security analysis is composed of a set of instructions, assumptions, and limitations
to analyze and solve security concerns and develop threat free applications.
Which of the following frameworks helps an organization in the evaluation of the company’s
information security with that of the industrial standards?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 4
Which of the following policies helps secure data and protects the privacy of organizational
information?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
C
Q: 5
In the TCP/IP model, the transport layer is responsible for reliability and flow control from source to
the destination. TCP provides the mechanism for flow control by allowing the sending and receiving
hosts to communicate.
A flow control mechanism avoids the problem with a transmitting host overflowing the buffers in the
receiving host.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
C
Q: 6
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following
command. What is he testing at this point?
include
#include
int main(int argc, char *argv[])
{
char buffer[10];
if (argc < 2)
{
fprintf(stderr, "USAGE: %s string\n", argv[0]);
return 1;
}
strcpy(buffer, argv[1]);
return 0;
}
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 7
ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol
(ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC
address with the IP address of another host (such as the default gateway), causing any traffic meant
for that IP address to be sent to the attacker instead.
ARP spoofing attack is used as an opening for other attacks.
What type of attack would you launch after successfully deploying ARP spoofing?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 8
Which one of the following log analysis tools is used for analyzing the server’s log files?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
C
Q: 9
DMZ is a network designed to give the public access to the specific internal resources and you might
want to do the same thing for guests visiting organizations without compromising the integrity of the
internal resources. In general, attacks on the wireless networks fall into four basic categories.
Identify the attacks that fall under Passive attacks category.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 10
What is the difference between penetration testing and vulnerability testing?