Question: 1
DES is often defined as no longer "secure enough" to handle high security requirements. Why is this?
Question: 2
To increase the security of your corporate website, you are running some basic checks on leaked information. You view the source code for a web page and see the following:
Security Certifications for the IT Pro From this code, which of the following would an attacker most likely assume is the operating system that was used to create this web site?
Question: 3
At the root@linuxbox$ prompt on a Linux machine you type ls -l b.doc and the output reads: -rw-rw-r--1 simonusers31337Oct 5 11:21 b.doc According to this output, which of the following is true?
Question: 4
You read on a security website that hackers are reading Newsgroup messages to try to identify potential targets and target details. You had previously not closed the port for the Newsgroup service on your firewall. After you close that port, you do an Internet newsgroup search for your domain name. You do find several messages from users in your organization. What type of information may be found by examining these messages?
Question: 5
What can be used to remove any of the frequency and statistical relationship between unencrypted and encrypted text? (Choose two)