1.
What is the primary method of mitigating port redirection attacks?
2.
Which attack is executed by Java applets and ActiveX controls?
3.
What service is provided by CSA Profiler?
4.
James the security administrator is working on cryptographic authentication. What is the earliest version of NTP that supports a cryptographic authentication mechanism between peers?
5.
You are the administrator at Certkiller Inc. and you need to mitigate threats to the network. How do you mitigate the threats presented when using TFTP?
6.
You are the administrator at Certkiller Inc. and you need to checkout syslogs for information. How do you check syslog information to ensure that it has not been altered in transit?
7.
If you permit syslog access from devices on the outside of a firewall, what type of filtering at the egress router should be implemented?
8.
If you are using SNMP for network management, you must make sure that?
9.
How do you mitigate the threats presented when using TFTP?
10.
What is the earliest version of NTP that supports a cryptographic authentication mechanism between peers?