- (Topic 2)
At which OSI layer does UDP operate?
Correct Answer:D
- (Topic 1)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?
Correct Answer:A
- (Topic 1)
Which of the following statements about digital signature is true?
Correct Answer:B
- (Topic 3)
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
Correct Answer:A
- (Topic 1)
Which of the following is a remote access protocol that supports encryption?
Correct Answer:A
- (Topic 2)
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
Correct Answer:BC