1.
Which statement correctly describes the difference between a secure cipher and a secure hash?
2.
Which of the following assessment tools would be MOST appropriate for determining if a password was being sent across the network in clear text?
3.
What maybe happen when hashing two different files creates the same result?
4.
A peer-to-peer computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. Which of the following is a security risk while using peer-to-peer software?
5.
From the listing of attacks, which analyzes how the operating system (OS) responds to specific network traffic, in an attempt to determine the operating system running in your networking environment?
6.
From the listing of attacks, choose the attack which misuses the TCP (Transmission Control Protocol) three-way handshake process, in an attempt to overload network servers, so that authorized users are denied access to network resources?
7.
Both the server and the client authenticate before exchanging dat a. This is an example of which of the following?
8.
A technician is helping an organization to correct problems with staff members unknowingly downloading malicious code from Internet websites. Which of the following should the technician do to resolve the problem?
9.
A protocol analyzer will most likely detect which security related anomalies?
10.
One type of network attack sends two different messages that use the same hash function to generate the same message digest. Which network attack does this?