00:00

QUESTION 36

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?

Correct Answer: A

QUESTION 37

Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?

Correct Answer: D

QUESTION 38

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ACD

QUESTION 39

Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?

Correct Answer: B

QUESTION 40

Which of the following is the unspecified address in IPv6?

Correct Answer: B