- (Topic 2)
Web mining allows a user to look for patterns in data through content mining, structure mining, and usage mining. What is the function of structure mining?
Correct Answer:
C
Structure mining is used to examine data related to the structure of a particular Web site. Answer D is incorrect. Usage mining is used to examine data related to a particular user's browser as well as data gathered by forms the user may have submitted during Web transactions.
- (Topic 2)
Which of the following tools uses Internet Control Message Protocol (ICMP)?
Correct Answer:
D
A ping scanner is a tool that sends ICMP ECHO requests across a network and rapidly makes a list of responding nodes. Internet Control Message Protocol (ICMP) is an integral part of IP. It is used to report an error in datagram processing. The Internet Protocol (IP) is used for host-to-host datagram service in a network. The network is configured with connecting devices called gateways. When an error occurs in datagram processing, gateways or destination hosts report the error to the source hosts through the
ICMP protocol. The ICMP messages are sent in various situations, such as when a datagram cannot reach its destination, when the gateway cannot direct the host to send traffic on a shorter route, when the gateway does not have the buffering capacity, etc. Answer A, B, C are incorrect. These tools do not use ICMP to perform their functions.
- (Topic 1)
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
Correct Answer:
C
An independent audit is an audit that is usually conducted by external or outside resources. It is the process of reviewing detailed audit logs for the following purposes: To examine the system activities and access logs To assess the adequacy of system methods To assess the adequacy of system controls To examine compliance with established enterprise network system policies To examine compliance with established enterprise network system procedures To examine effectiveness of enabling, support, and core processes Answer B is incorrect. It is not a valid type of security audit. Answer D is incorrect. It is done to examine the operational and ongoing activities within a network. Answer B is incorrect. It is not a valid type of security audit. Answer D is incorrect. It is done to examine the operational and ongoing activities within a network. Answer A is incorrect. It is not a valid type of security audit.
- (Topic 2)
What is the purpose of Cellpadding attribute of