An Intrusion Detection System(IDS) has alerted the network administrator to a possibly
malicious sequence of packets went to a Web server in the network’s external DMZ. The
packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely
malicious or simply a false positive?
A.
Protocol analyzer
B.
Intrusion Prevention System (IPS)
C.
Vulnerability scanner
D.
Network sniffer
Intrusion Prevention System (IPS)
PGP, SSL, and IKE are all examples of which type of cryptography?
A.
Hash Algorithm
B.
Secret Key
C.
Public Key
D.
Digest
Public Key
A company’s security states that all web browsers must automatically delete their HTTP
browser cookies upon terminating. What sort of security breach is this policy attempting to
mitigate?
A.
Attempts by attackers to determine the user's Web browser usage patterns, including
when sites were visited and for how long.
B.
Attempts by attackers to access passwords stored on the user's computer without the
user's knowledge.
C.
Attempts by attackers to access Web sites that trust the Web browser user by stealing
the user's authentication credentials.
D.
Attempts by attacks to access the user and password information stores in the
company's SQL database.
Attempts by attackers to access Web sites that trust the Web browser user by stealing
the user's authentication credentials.
Ricardo wants to send secret messages to acompetitor company. To secure these
messages, he uses a technique of hiding a secret message within an ordinary message,
the technique provides 'security through obscurity'. What technique is Ricardo using?
A.
RSA algorithm
B.
Steganography
C.
Encryption
D.
Public-key cryptography
Steganography
Which regulationdefines security and privacy controls for Federal information systems and
organizations?
A.
HIPAA
B.
EU Safe Harbor
C.
PCI-DSS
D.
NIST-800-53
NIST-800-53
Page 3 out of 25 Pages |
Previous |