1.
Choose the items that an intruder would ignore when going through disposed garbage. Choose all options that apply.
2.
A Windows file server is an example of which of the following types of models?
3.
Disguising oneself as a reputable hardware manufacturer's field technician who is picking up a server for repair would be described as:
4.
The Certpaper .com wireless network environment uses WEP (Wired Equivalent Privacy) to provide wireless security. Choose the entity or entities that can authenticate to an access point.
5.
A user receives an email asking the user to reset the online banking username and password. The email contains a link and when the user accesses the link, the URL that appears in the browser does not match the link. This would be an example of:
6.
WTLS (Wireless Transport Layer Security) provides security services between network devices or mechanisms. Which is it? Choose all that apply.
7.
Which of the following web vulnerabilities is being referred to when it receives more data than it is programmed to accept?
8.
An administrator is concerned that PCs on the internal network may be acting as zombies participating in external DDoS attacks. Which of the following could BEST be used to confirm the administrator's suspicions?
9.
Choose the primary disadvantage of using a third party mail relay.
10.
You work as the security administrator at Certpaper .com. You want to implement a solution which will provide the following for handled devices in your wireless network: 1. Data privacy 2. Data integrity 3. Authentication Which solution should you implement?