1.
Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?
2.
What is the best defense against privilege escalation vulnerability?
3.
Fingerprinting VPN firewalls is possible with which of the following tools?
4.
A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?
5.
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
6.
Which of the following is a client-server tool utilized to evade firewall inspection?
7.
Which of the following is a symmetric cryptographic standard?
8.
Which of the following cryptography attack methods is usually performed without the use of a computer?
9.
What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?
10.
Which of the following open source tools would be the best choice to scan a network for potential targets?