1.
What statement is true regarding LM hashes?
2.
What is a successful method for protecting a router from potential smurf attacks?
3.
Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
4.
The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity, confidentiality and
5.
A security administrator notices that the log file of the company`s webserver contains suspicious entries: Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
6.
Which of the following is a detective control?
7.
A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique should the tester consider using?
8.
A circuit level gateway works at which of the following layers of the OSI Model?
9.
Which of the following lists are valid data-gathering activities associated with a risk assessment?
10.
A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?