6. A large company wants to deploy an FTP server to support file transfers between business customers and partners. Which of the following should the security specialist consider before making these changes?www.killtest.com
A. FTP can be deployed on an isolated server but is unencrypted.
B. FTP can consume significant bandwidth.
C. FTP facilitates business-to-business file transfers and has few risks.
D. FTP transfers data in an unencrypted format.
Answer: D
7. WEP uses which of the following stream ciphers?
A. RC2
B. RC4
C. IKE
D. 3DES
Answer: B
8. A common tool used for wireless sniffing and war driving is:www.killtest.com
A. S/MIME.
B. Sam Spade.
C. NetStumbler.
D. NESSUS.
Answer: C
9. Which of the following is a common type of attack on web servers?
A. Birthday
B. Buffer overflow
C. Spam
D. Brute force
Answer: B
10. Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?www.killtest.com
A. Anti-aliasing
B. Data integrity
C. Asymmetric cryptography
D. Non-repudiation
Answer: D
Tuesday, October 14, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment