You have installed Windows Vista Home Premium on your home computer. The computer is connected to the Internet through an ADSL connection. You want to protect yourself from the traps of fraudulent sites. Which of the following features of Internet Explorer 7+ will you use?
A. Pop-up blocker
B. Protected mode
C. Privacy settings
D. Phishing filter
What do spikes in a power line indicate?
A. Interference superimposed onto the power line
B. Momentary high voltage
C. Prolonged loss of power
D. Momentary low voltage
IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique? Each correct answer represents a complete solution. Choose all that apply.
A. SSHGuard
B. portsentry
C. OpenSSL
D. nmap
E. Fail2Ban
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
A. It uses asymmetric key pairs.
B. It uses symmetric key pairs.
C. It provides security using data encryption and digital signature.
D. It is a digital representation of information that identifies users.
Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which
of the following statements are true about the Black Box penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
A. Black box testing provides the testers with complete knowledge of the infrastructure to be tested.
B. Black box testing simulates an attack from someone who is familiar with the system.
C. Black box testing simulates an attack from someone who is unfamiliar with the system.
D. Black box testing assumes no prior knowledge of the infrastructure to be tested.
Which of the following types of attacks cannot be prevented by a firewall? Each correct answer represents a complete solution. Choose all that apply.
A. Ping flood attack
B. Phishing attack
C. Shoulder surfing attack
D. URL obfuscation attack
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?
A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start
C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use the Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret
information?
Each correct answer represents a complete solution. Choose all that apply.
A. Hidden partition
B. Dumb space
C. Slack space
D. Unused sectors
Your project is to implement a new operating system for all of the workstations in your company's network. Every workstation must have the new operating system as part of an organization-wide mandate. Many users are not happy with this decision and are resisting the change. Some of the users are complaining that they do not want the operating system at all. What type of stakeholders are these users?
A. Con stakeholders
B. Customers
C. Negative stakeholders
D. End-users
Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?
A. The distortion technique
B. The substitution technique
C. The cover generation technique
D. The spread spectrum technique