Which of the following defines the communication link between a Web server and Web applications?
A. PGP
B. CGI
C. IETF
D. Firewall
You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two.
A. Rename the Administrator account.
B. Remove the Administrator account.
C. Disable the Guest account.
D. Enable the Guest account.
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
A. Chain of custody
B. Evidence access policy
C. Chain of evidence
D. Incident response policy
Which of the following is a signature-based intrusion detection system (IDS) ?
A. StealthWatch
B. Snort
C. RealSecure
D. Tripwire
In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?
A. TCP FIN scanning
B. DNS poisoning
C. Snooping
D. TCP SYN scanning
Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.
A. Assuring the integrity of organizational data
B. Building Risk free systems
C. Risk control
D. Risk identification
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
A. Man-in-the-middle
B. Brute force
C. Denial of Service (DoS)
D. Dictionary
Which of the following statements about DES (Data Encryption Standard) is true?
A. Its most widely used symmetric encryption algorithm uses a 56-bit key.
B. Its most widely used symmetric encryption algorithm uses a 32-bit key.
C. Its most widely used symmetric encryption algorithm uses a 128-bit key.
D. Its most widely used symmetric encryption algorithm uses a 64-bit key.