Which of the following devices allows wireless communication devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards?
Which of the following devices allows wireless communication devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards?A . Express cardB . WAPC . WNICD . Wireless repeaterE . NoneView AnswerAnswer: B Explanation: A wireless access point (WAP) is a device that allows wireless communication devices to...
Which of the following statements best describes the consequences of the disaster recovery plan test?
Which of the following statements best describes the consequences of the disaster recovery plan test?A . The plan should not be changed no matter what the results of the test would be.B . The results of the test should be kept secret.C . If no deficiencies were found during the...
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?A . IPSB . HIDSC . DMZD . NIDSView AnswerAnswer: B Explanation: A host-based intrusion detection system (HIDS) produces a false alarm because...
John works as a C programmer. He develops the following C program:
John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.A . SQL injectionB . Denial-of-ServiceC . Buffer overflowD . Cross site scriptingView AnswerAnswer: C Explanation: This program takes a user-supplied string and copies it into 'buffer1', which can hold up...
Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?
Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?A . Application layerB . Internet layerC . Link layerD . Transport LayerE . NoneView AnswerAnswer: C Explanation: The Link Layer of TCP/IP model is...
Which of the following TCP commands are used to allocate a receiving buffer associated with the specified connection?
Which of the following TCP commands are used to allocate a receiving buffer associated with the specified connection?A . SendB . CloseC . NoneD . ReceiveE . InterruptView AnswerAnswer: D Explanation: The Receive command is used to allocate a receiving buffer associated with the specified connection. An error is returned...
Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.
Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.A . Circuit-level gatewayB . StatefulC . Proxy serverD . Dynamic packet-filteringView AnswerAnswer: DB Explanation:...
Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?
Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?A . Website defacementB . Zero-day attackC . SpoofingD . Buffer overflowView AnswerAnswer: A Explanation: Website defacement is an attack on a website...
Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.A . Message replayB . Identity theftC . Message modificationD . Message digestE . Message repudiationF . EavesdroppingG . False messageView AnswerAnswer: FBCGAE Explanation: Following are...
Which of the following policies helps in defining what users can and should do to use network and organization's computer equipment?
Which of the following policies helps in defining what users can and should do to use network and organization's computer equipment?A . General policyB . Remote access policyC . IT policyD . User policyView AnswerAnswer: D Explanation: A user policy helps in defining what users can and should do to...