00:00

QUESTION 1

- (Exam Topic 2)
Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.
Solution:
Executive summary

Does this meet the goal?

Correct Answer: A

QUESTION 2

- (Exam Topic 1)
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Correct Answer: A

QUESTION 3

- (Exam Topic 2)
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

Correct Answer: A

QUESTION 4

- (Exam Topic 1)
You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

Correct Answer: B

QUESTION 5

- (Exam Topic 1)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

Correct Answer: D