00:00

QUESTION 1

- (Topic 2)
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.
Which of the following attacking methods can he use to send the dangerous software protocols?

Correct Answer: A

QUESTION 2

- (Topic 1)
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Correct Answer: B

QUESTION 3

- (Topic 2)
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: AC

QUESTION 4

- (Topic 2)
Which of the following statements are true about TCP/IP model?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABC

QUESTION 5

- (Topic 2)
Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Correct Answer: D