You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?
Correct Answer:
A
Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?
Correct Answer:
D
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ACD
Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?
Correct Answer:
B
Which of the following is the unspecified address in IPv6?
Correct Answer:
B