Question: 1
Which two technologies should research groups use for secure VPN access while traveling?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose two.
Question: 2
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server:
* Footprinting
* Scanning
Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?
Each correct answer represents a complete solution. Choose all that apply.
Question: 3
Which of the following malicious software implements itself on the kernel level of any operating system and is hard to detect and delete?
Question: 4
You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?
Question: 5
Which of the following wireless networks transmits data probably at 115 Kbps?