Ssdsdsdsadasd
Ssdsdsdsadasd
1. In a layer of the we, content are not indexed by search engines and can
only be accessed by a user with due authorization. Identity this layer pf
the web.
o Surface web
o Deep web
o World wide web
o Dark web
2. Which of the following activities is implemented to check wheter
anorganization is following a set of standars policies and procedures in
protecting its network?
o Ethical Hacking
o Security Audit
o Penetration Testing
o Vulnarability Assessment
3. Which of the following logs contains complete information about
security events such as successful and unsuccessful verification
attemps, file accesses information, changes in the security policy, and
changes in the account?
o Application logs
o Event logs
o Audit logs
o Security software logs
4. What is the maximum bandwidth provided by 802.11g wireless
standard.?
o 11 Mbps
o 22 Mbps
o 2 Mbps
o 54 Mbps
5. Which of the following sentences is not an advantage of network traffic
monitoring?
o Increasing bandwith bottlenecks
o Detecting sign of malicious activity
o Investigating security breaches
o Determining download/upload speeds.
6. Which of the following is an outgoing mail server that allows users to
send email to a valid email address using port number 25?
o FTP Server
o SMTP Server
o Raidus Server
o HTTP Server
7. What is defined as the art and science of hiding information by
embedding messeges within other, seemingly harmless messages?
o Digital Watermarking
o Cyptography
o Photography
o Steganography
8. Which of the following event correlation approaches predict the
attacker’s action by studying and probability theory?
o Bayesian Correlation
o Time based approach
o Automated field correlation
o Time based approach
9. Which of the following browser based attack involves emails or pop-ups
that redirect users to fake web pages that mimic trustworthy sites,
demanding the users to submit personal information?
o Framing
o Clickjacking
o Man in the mobile
o Phising
10. Which of the following attack allows attackers to bypass client id
security mechanisms and gain access privileges, and then inject
malicious script into specific web pages?
o Buffer overflow
o Denial of services
o Cross site scripting
o Parameter/form tampering
11. Which of the following file dependencies is a networking DLL that helps
connect to a network of perform network related task?
o Kernel32.Dll
o Advapi32.Dll
o Wsock32.Dll
o Ntdll.Dll
12. Which of the following technologies is referred to as a wireless sensor
protocol that enables communication between sensors an their
controllers?
o ANT
o GPS
o USB
o Satcom
13. It is a type of Crime in Which one person fraudulently converts the
property of another for the legal possession of that property. Which of
the following computer crimer type best matches the description?
o Identity theft
o Drug trafficking
o Embezzlement
o Cyber stalking
14. Which of the following command line tools helps investigators analyze a
suspect office document and check whether any components are
labeled as maillcious?
o DriverView
o FastSum
o Oleid
o WinMD5
15. Which of the following email features enables organizations to specify
servers that can send emails on behalf of their domains?
o POP3
o SPF
o MIME
o DKIM
16. Which of the following objectives of cryptography defines the
trustworthiness of data or resources to prevent improper and
unauthorized changes?
o Integrity
o Confidentiality
o Authentication
o Nonrepudation
17. Which of the following helps to determine a logical timeline of a
security incident an the users responsible and resides in registers, cache,
and RAM?
o Hard Drive
o Non Volatile information
o Volatile information
o Registry