Topic 1: Volume A
Anonymizer sites access the Internet on your behalf, protecting your personal information
from disclosure. An anonymizer protects all of your computer's identifying information while
it surfs for you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by
you. Services that provide anonymity disable pop-up windows and cookies, and conceal
visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user
requests a Web page by clicking a hyperlink or typing a URL into their browser, the service
retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service
in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
A.
Increase your Web browsing bandwidth speed by using Anonymizer
B.
To protect your privacy and Identity on the Internet
C.
To bypass blocking applications that would prevent access to Web sites or parts of sites
that you want to visit
D.
Post negative entries in blogs without revealing your IP identity
To protect your privacy and Identity on the Internet
To bypass blocking applications that would prevent access to Web sites or parts of sites
that you want to visit
Post negative entries in blogs without revealing your IP identity
This tool is widely used for ARP Poisoning attack. Name the tool.
A.
Cain and Able
B.
Beat Infector
C.
Poison Ivy
D.
Webarp Infector
Cain and Able
You just purchased the latest DELL computer, which comes pre-installed with Windows 7,
McAfee antivirus software and a host of other applications. You want to connect Ethernet
wire to your cable modem and start using the computer immediately. Windows is
dangerously insecure when unpacked from the box, and there are a few things that you
must do before you use it.
A.
New installation of Windows should be patched by installing the latest service packs and
hotfixes
B.
Key applications such as Adobe Acrobat, Macromedia Flash, Java, Winzip etc., must
have the latest security patches installed
C.
Install a personal firewall and lock down unused ports from connecting to your computer
D.
Install the latest signatures for Antivirus software
E.
Configure "Windows Update" to automatic
F.
Create a non-admin user with a complex password and logon to this account
G.
You can start using your computer as vendors such as DELL, HP and IBM would have
already installed the latest service packs.
New installation of Windows should be patched by installing the latest service packs and
hotfixes
Install a personal firewall and lock down unused ports from connecting to your computer
Install the latest signatures for Antivirus software
Configure "Windows Update" to automatic
Create a non-admin user with a complex password and logon to this account
This attack uses social engineering techniques to trick users into accessing a fake Web site
and divulging personal information. Attackers send a legitimate-looking e-mail asking users
to update their information on the company's Web site, but the URLs in the e-mail actually
point to a false Web site
A.
Wiresharp attack
B.
Switch and bait attack
C.
Phishing attack
D.
Man-in-the-Middle attack
Phishing attack
Which of the following type of scanning utilizes automated process of proactively identifying
vulnerabilities of the computing systems present on a network?
A.
Port Scanning
B.
Single Scanning
C.
External Scanning
D.
Vulnerability Scanning
Vulnerability Scanning
Page 8 out of 175 Pages |
Previous |