Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-239" Exam

HP Latest dump needed

 HP Latest dump needed 
anyone have 
ad it 
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for SY0-301 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "SY0-301" Exam

CompTIA Security+ (2008 Edition) Exam

 Question 1.
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

A. SSL.
B. SSH.
C. L2TP.
D. IPSeC.

Answer: C

Question 2.
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

A. Steganography
B. Worm
C. Trojan horse
D. Virus

Answer: A

Question 3.
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

A. Teardrop
B. TCP/IP hijacking
C. Phishing
D. Replay

Answer: B

Question 4.
How should a company test the integrity of its backup data?

A. By conducting another backup
B. By using software to recover deleted files
C. By restoring part of the backup
D. By reviewing the written procedures

Answer: C

Question 5.
Which of following can BEST be used to determine the topology of a network and discover unknown devices?

A. Vulnerability scanner
B. NIPS
C. Protocol analyzer
D. Network mapper

Answer: D

Question 6.
When should a technician perform penetration testing?

A. When the technician suspects that weak passwords exist on the network
B. When the technician is trying to guess passwords on a network
C. When the technician has permission from the owner of the network
D. When the technician is war driving and trying to gain access

Answer: C

Question 7.
An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.

Which of the following is wrong with the server?

A. SMTP open relaying is enableD.
B. It does not have a spam filter.
C. The amount of sessions needs to be limiteD.
D. The public IP address is incorrect.

Answer: A

Question 8.
Which of the following is MOST efficient for encrypting large amounts of data?

A. Hashing algorithms
B. Symmetric key algorithms
C. Asymmetric key algorithms
D. ECC algorithms

Answer: B

Question 9.
Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?

A. Rogue access points
B. War driving
C. Weak encryption
D. Session hijacking

Answer: B

Question 10.
Which of the following BEST describes ARP?

A. Discovering the IP address of a device from the MAC address
B. Discovering the IP address of a device from the DNS name
C. Discovering the MAC address of a device from the IP address
D. Discovering the DNS name of a device from the IP address

Answer: C


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.