Question 1
(corresponding objective: 2.1)
Administrators currently use telnet to remotely manage several servers. Security policy dictates that passwords and administrative activities must not be communicated in clear text. Which of the following is the best alternative to using telnet?
A. DES (Data Encryption Standard)
B. S-Telnet
C. SSH (Secure Shell)
D. PKI (Public Key Infrastructure)
Question 2
(corresponding objective: 1.2)
When does CHAP (Challenge Handshake Authentication Protocol) perform the handshake process?
A. when establishing a connection and at anytime after the connection is established
B. only when establishing a connection and disconnecting
C. only when establishing a connection
D. only when disconnecting
Question 3
(corresponding objective: 4.2)
A block cipher is an example of which of the following encryption algorithms?
A. asymmetric key
B. public key
C. symmetric key
D. unkeyed
Question 4
(corresponding objective: 5.5)
A need to know security policy would grant access based on:
A. least privilege
B. less privilege
C. loss of privilege
D. single privilege
Question 5
(corresponding objective: 3.3)
The primary purpose of NAT (Network Address Translation) is to:
A. translate IP (Internet Protocol) addresses into user friendly names
B. hide internal hosts from the public network
C. use one public IP (Internet Protocol) address on the internal network as a name server
D. hide the public network from internal hosts
Question 6
(corresponding objective: 2.4)
LDAP (Lightweight Directory Access Protocol) directories are arranged as:
A. linked lists
B. trees
C. stacks
D. queues
Question 7
(corresponding objective: 1.4)
The goal of TCP (Transmission Control Protocol) hijacking is:
A. taking over a legitimate TCP (Transmission Control Protocol) connection
B. predicting the TCP (Transmission Control Protocol) sequence number
C. identifying the TCP (Transmission Control Protocol) port for future exploitation
D. identifying source addresses for malicious use
Network Instruments has brought out an expandable version of its GigaStor network data recorder, capable…
Microsoft firmasi Cin (china)'deki satislarini arttirabilmeyi hedeflemek icin Vista'nin satis fiatini dramatik bir sekilde dusurdu.…
Microsoft Corp. has dramatically cut the price of Windows Vista in China in a bid…
Bilim kurgu fanatikleri beni affetsinler ama bu lanet olasi modern fizikte neler oluyor? Physical Review’in…
Kuresel cam balona benzeyen zaman makinesini uzay ve zamanin herhangi bir koordinat noktasina dogru hareket…
TROJAN NEDİR? Trojan (Truva atı); iki kısımdan oluşan ve bilgisayarları uzaktan kumanda etme amacıyla yazılmış…