Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?
A. CHKDSK /I
B. CHKDSK /R /F
C. CHKDSK /C /L
D. CHKDSK /V /X
Users on a TCP/IP network are able to ping resources using IP addresses. However, they are unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?
A. Proxy
B. DHCP
C. DNS
D. WINS
You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?
A. Implement a passive IDS
B. Implement a honey pot.
C. Implement a stateful packet inspection firewall.
D. Implement a network based IDS.
Which of the following encryption methods are used by the BlackBerry to provide security to the data stored in it? Each correct answer represents a complete solution. Choose two.
A. Triple DES
B. Blowfish
C. AES
D. RSA
Which of the following is an example of a firewall?
A. ZoneAlarm
B. PatriotBox
C. Specter
D. KFSensor
Which of the following partitions contains the system files that are used to start the operating system?
A. Boot partition
B. System partition
C. Secondary partition
D. Primary partition
Which of the following image file formats uses a lossy data compression technique?
A. GIF
B. JPG
C. PNG
D. TIF
What is the maximum size of an IP datagram for Ethernet?
A. 4500 bytes
B. 1024 bytes
C. 1200 bytes
D. 1500 bytes
Sniffer operates at which layer of the OSI reference model?
A. Data Link
B. Physical
C. Transport
D. Presentation
Which of the following statements are true about snort? Each correct answer represents a complete solution. Choose all that apply.
A. It develops a new signature to find vulnerabilities.
B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.
C. It encrypts the log file using the 256 bit AES encryption scheme algorithm.
D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.