Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?
A. Enablestateful multi-layer inspection on the packet filter
B. Implement caching on the network proxy server
C. Enable authentication on the network proxy server
D. Implement a screening router on the network DMZ
Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?
A. Updating the company vulnerability scanner and conducting a new scan
B. Adding a buffer overflow rule to the intrusion detection system
C. Reconfiguring the firewall
D. Installing a system update
Which of the following standards is used for digital certificates?
A. DES
B. Diffie-Hellman
C. X.509
D. RC5
You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following describes the function of the asymmetric-key-encryption algorithm used?
A. It encrypts the symmetric key.
B. It encrypts all of the data.
C. It encrypts the hash code used for data integrity.
D. It encrypts the X.509 key.
A security breach has occurred involving the company e-commerce server. Customer credit card data has been released to unauthorized third parties. Which of the following lists the appropriate parties to inform?
A. Shareholders, law enforcement agencies and company employees
B. Affected customers, credit card companies and law enforcement agencies
C. The Internet Service Provider, ICANN and company shareholders
D. External securityconsultants, company board members and affected customers
Which of the following errors most commonly occurs when responding to a security breach?
A. Shutting down network access using the firewall, rather than the network router
B. Adhering to the company policy rather than determining actions based on the IT manager's input
C. Making snap judgments based on emotions, as opposed to company policy
D. Taking too much time to document the attack
You have implemented a service on a Linux system that allows a user to read and edit resources. What is the function of this service?
A. Authentication
B. Data integrity
C. Access control
D. Intrusion detection
Which of the following can help you authoritatively trace a network flooding attack?
A. Your ISP
B. Firewall logs
C. Router logs
D. Ping
Consider the following image: From the information in this image, what type of attack is occurring?
A. A man-in-the-middle attack
B. A brute-force attack
C. A connection-hijacking attack
D. A spoofingattackD.A spoofing attack
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?
A. Brute force
B. Denial of service
C. Botnet
D. Buffer overflow