- (Exam Topic 2)
Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.
Solution:
Executive summary
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 1)
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
Correct Answer:
A
- (Exam Topic 2)
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?
Correct Answer:
A
- (Exam Topic 1)
You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?
Correct Answer:
B
- (Exam Topic 1)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?
Correct Answer:
D