1.
Consider the following scenario. A user receive an email with a link to a video about a news item, but another valid page, for instance a product page on ebay.com, can be hidden on top underneath the 'Play' button of the news video. The user tries to play' the video but actually buys' the product from ebay.com. Which malicious technique is used in the above scenario?
2.
Which of the following concepts are included in the security of a SAN? Each correct answer represents a complete solution. Choose all that apply.
3.
Which of the following are the reasons to use SAN? Each correct answer represents a complete solution. Choose all that apply.
4.
In which level of threats of the SAN are threats large scale attacks and difficult to prevent?
5.
Which of the following features are provided by SAN for SQL servers? Each correct answer represents a complete solution. Choose all that apply.
6.
Which of the following statements are true about distributed computing? Each correct answer represents a complete solution. Choose all that apply.
7.
Interceptor is a pseudo proxy server that performs HTTP diagnostics, which of the following features are provided by HTTP Interceptor? Each correct answer represents a complete solution. Choose all that apply.
8.
Which of the following refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements?
9.
The Top Level Management contains the Board of Directors (BOD) and the Chief Executive Officer (CEO) or General Manager (GM) or Managing Director (MO) or President. What are the roles of the top level management? Each correct answer represents a complete solution. Choose all that apply.
10.
Compliance is described as dutifulness, obligingness, pliability, tolerance, and tractability. Which of the following are multitude of standards that a project must comply? Each correct answer represents a complete solution. Choose all that apply.