Sample Questions
Q) Which of the following types of encryption to provide the same level of security, but also to use smaller keys and fewer
computing resources than logarithms, which are calculated on a finite field?
a) elliptic curve
b) Diffie-Hellman
c) quantum
d) El Gamal
e) None
Q) Which of the following best describes the purpose of Fuzzing?
a) To decrypt network sessions
b) In order to gain unauthorized access to the object
c) To hide or session activity
d) To find a buffer overflow vulnerability
e) None
Q) The security administrator is considering remote access and web logs. The Administrator notes that users are already logged
in at odd hours from several continents on the same day. security administrator suspects that a company is a victim of any of these types of attacks?
a) TCP / IP hijacking
b) forgery
c) replay
d) Domain name kiting
e) None
Q) Which of the following is the default rule is in the list of corporate firewalls, access control?
a) Protection against fraud
b) allow all
c) Multicast list
d) to ban all
e) None