Which of the following are provided by digital signatures?
A. Identification and validation
B. Authentication and identification
C. Integrity and validation
D. Security and integrity
Which of the following is the best way of protecting important data against virus attack?
A. Implementing a firewall.
B. Updating the anti-virus software regularly.
C. Taking daily backup of data.
D. Using strong passwords to log on to the network.
Jason works as a System Administrator for www.company.com Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Reg.exe
B. EventCombMT
C. Regedit.exe
D. Resplendent registrar
Adam works as a Security Analyst for Umbrella Inc. The company has a Linux-based network comprising an Apache server for Web applications. He received the following Apache Web server log, which is as follows:
[Sat Nov 16 14:32:52 2009] [error] [client 128.0.0.7] client denied by server configuration: /export/home/htdocs/test
The first piece in the log entry is the date and time of the log message. The second entry determines the severity of the error being reported. Now Adam wants to change the severity level to control the types of errors that are sent to the error
log. Which of the following directives will Adam use to accomplish the task?
A. CustomLog
B. ErrorLog
C. LogFormat
D. LogLevel
Which of the following is a Unix and Windows tool capable of intercepting traffic on a network segment and capturing username and password?
A. AirSnort
B. Ettercap
C. BackTrack
D. Aircrack
Which of the following protocols uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets?
A. PPTP
B. ESP
C. LWAPP
D. SSTP
Which of the following protocols is used in wireless networks?
A. CSMA
B. CSMA/CD
C. ALOHA
D. CSMA/CA
Which of the following protocols sends a jam signal when a collision is detected?
A. ALOHA
B. CSMA/CA
C. CSMA/CD
D. CSMA
Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?
A. Striping
B. None of these
C. Parity
D. Mirroring
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?
A. Jacob should use ESP in pass-through mode.
B. Jacob should utilize ESP in tunnel mode.
C. He should use ESP in gateway mode.
D. He should use ESP in transport mode.