Professional Documents
Culture Documents
What type of attack do some firewalls try to limit by enforcing rules on how long a GET or
POST request can be?
[A] Smurf
[D] LAND
(Ans):-C
2. This is a documents that states in writing how a company plans to protect the company’s
physical and IT assets:
[E] Copyright
(Ans):-B
3. This is the process of determining whether someone or something os, in fact, who or what
is declared to be?
[B] Anonymizer
[C] Bypass
[E] Authentication
(Ans):-E
4. This is an agreement a company may ask an employee to sign that specifies what is
considered to be appropriate (or in appropriate) use of e-mail or web browsing?
[A] RSA
[B] AUP
[C] SET
[D] VPN
(Ans):-B
[B] Grsecurity
[C] LOMAC
(Ans):-D
[A] VPN
[B] Encryption
[D] Firewall
(Ans):-E
7. This is a set of related programs, usually located at a network gateway server, that protects
the resources of a private network from other network:
[A] Firewall
[C] Sandbox
(Ans):-A
8. What happens if you digitally sign and inject footer on an e-mail message in the order?
[A] Nothing
(Ans):-C
9. This is a class of programs that searches your hard drive and floppy disks for any known or
potential virus:
[C] Antigen
[D] Probe
(Ans):-E
10. The basic objective of Audit is:
(Ans):-E
(Ans):-B
(Ans):-E
(Ans):-B
(Ans):-E
(Ans):-D