Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup

Transcript
C. Thresholding interferes with the IDS' ability to reassemble fragmented packets.
D. The IDS will not distinguish among packets originating from different sources.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 504
Which of the following is considered an acceptable option when managing a risk?
A.
B.
C.
D.
Reject the risk.
Deny the risk.
Mitigate the risk.
Initiate the risk.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 505
A person approaches a network administrator and wants advice on how to send encrypted email from home.
The end user does not want to have to pay for any license fees or manage server services. Which of the
following is the most secure encryption protocol that the network administrator should recommend?
A.
B.
C.
D.
IP Security (IPSEC)
Multipurpose Internet Mail Extensions (MIME)
Pretty Good Privacy (PGP)
Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 506
__________ is found in all versions of NTFS and is described as the ability to fork file data into existing files
without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows
Explorer
A.
B.
C.
D.
Alternate Data Streams
Merge Streams
Steganography
NetBIOS vulnerability
Correct Answer: A
Section: (none)
Explanation