You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it.
Which of the following risks may occur due to the existence of these problems?
A. Residual risk
B. Inherent risk
C. Secondary risk
D. Detection risk
Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?
A. 20
B. 443
C. 80
D. 21
You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company.
Which of the following can be a cause for making the network vulnerable? (Choose two)
A. Use of well-known code
B. Use of uncommon code
C. Use of uncommon software
D. Use of more physical connections
You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information
have been traced.
You discover the following clues:
The information has proved beneficial to another company.
The other company is located about 340 feet away from your office.
The other company is also using wireless network.
The bandwidth of your network has degraded to a great extent.
Which of the following methods of attack has been used?
A. A piggybacking attack has been performed.
B. A DOS attack has been performed.
C. The information is traced using Bluebugging.
D. A worm has exported the information.
You want to repeat the last command you entered in the bash shell.
Which of the following commands will you use?
A. history ##
B. history !#
C. history !!
D. history !1
You work as the Network Technician for XYZ CORP. The company has a Linux-based network. You are working on the Red Hat operating system. You want to view only the last 4 lines of a file named /var/log/cron.
Which of the following commands should you use to accomplish the task?
A. tail -n 4 /var/log/cron
B. tail /var/log/cron
C. cat /var/log/cron
D. head /var/log/cron
Which of the following applications work as mass-emailing worms? (Choose two.)
A. Chernobyl virus
B. I LOVE YOU virus
C. Nimda virus
D. Melissa virus
You work as a Software Developer for UcTech Inc. You want to ensure that a class is informed whenever an attribute is added, removed, or replaced in a session.
Which of the following is the event that you will use to accomplish the task?
A. HttpSessionBindingEvent
B. HttpAttributeEvent
C. HttpSessionEvent
D. HttpSessionAttributeEvent
The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol.
Which of the following statements are true about EAP-TLS?
A. It uses password hash for client authentication.
B. It uses a public key certificate for server authentication.
C. It is supported by all manufacturers of wireless LAN hardware and software.
D. It provides a moderate level of security.
Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the company. In the Web site, she uses multiple and overlapping style definitions to control the appearance of HTML elements.
What is this technique known as?
A. Style sheet
B. Cascading Style Sheet
C. Overlapping Style Sheet
D. Core sheet