Question 55

- (Topic 2)
At which OSI layer does UDP operate?

Correct Answer:D

Question 56

- (Topic 1)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Correct Answer:A

Question 57

- (Topic 1)
Which of the following statements about digital signature is true?

Correct Answer:B

Question 58

- (Topic 3)
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Correct Answer:A

Question 59

- (Topic 1)
Which of the following is a remote access protocol that supports encryption?

Correct Answer:A

Question 60

- (Topic 2)
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

Correct Answer:BC

START GISF EXAM