Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah wants greater control over the appearance and presentation of Web pages. She wants the ability to precisely specify the display attributes and the appearance of elements on the Web pages.
How will she accomplish this?
A. Use the Database Design wizard.
B. Make two templates, one for the index page and the other for all other pages.
C. Use Cascading Style Sheet (CSS).
D. Make a template and use it to create each Web page.
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
A. Non-operational audit
B. Dependent audit
C. Independent audit
D. Operational audit
Which of the following mechanisms is closely related to authorization?
A. Sending secret data such as credit card information.
B. Allowing access to a particular resource.
C. Verifying username and password.
D. Sending data so that no one can alter it on the way.
You work as a Network Administrator for TechPerfect Inc. The company has a secure wireless network. Since the company's wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool.
Which of the following statements are true about NetStumbler?
A. It can be integrated with the GPS.
B. It cannot identify the channel being used.
C. It can identify the SSIDs.
D. It works with a wide variety of cards.
John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company.
Which of the following can be the purpose of this analysis? (Choose three)
A. To ensure absolute safety during the audit
B. To analyze exposure to risk in order to support better decision-making and proper management of those risks
C. To try to quantify the possible impact or loss of a threat
D. To assist the auditor in identifying the risks and threats
On which of the following does a CGI program execute?
A. Router
B. Web server
C. Client
D. Client and Web server
Which of the following statements about Secure Sockets Layer (SSL) are true? (Choose two)
A. It provides connectivity between Web browser and Web server.
B. It provides mail transfer service.
C. It provides communication privacy, authentication, and message integrity.
D. It uses a combination of public key and symmetric encryption for security of data.
You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security.
Which of the following devices would you use to accomplish the task?
A. Proxy server
B. IDS
C. Packet filtering firewall
D. honeypot
Which of the following are the drawbacks of the NTLM Web authentication scheme?
A. The password is sent in hashed format to the Web server.
B. It works only with Microsoft Internet Explorer.
C. The password is sent in clear text format to the Web server.
D. It can be brute forced easily.
What are the purposes of audit records on an information system? (Choose two)
A. Upgradation
B. Backup
C. Troubleshooting
D. Investigation