Answered>Order 13607
Question 1. True or False
- SDN, NV, and NFV can work on existing networks because they reside on servers and interact with “groomed” traffic sent to them; True or False.
- Remote monitoring (RMON) is designed for “flow-based” monitoring, while SNMP is often used for “device-based” management True or False
- SNMP v2 can run on AppleTalk, IPX and OSI protocol stacks while SNMP v1 runs only over UDP. True or False
- IPSEC- Application has more control. True or False
- Spyware is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. True or False
- Attack vector break the crypto that is protecting data. True or False
Question 2. Multiple Choice
Select all answers that apply. What Mobile Device Management (MDM) technologies support single sign-on?
- BES10
- MobileIron
- Fixmo
- Airwatch
- HTC M8
Select all answers that apply. When using Cellular Authentication, Voice Privacy and Encryption (CAVE)-based authentication, A secret key is known:
- only to the BS and AC
- only to the MS and AC
- only to the MS and BS
- only to the MS or BS
- to generate a secondary key
Select all answers that apply. Why are Bots are hard to detect:
- Code is usually written in a way that is undetectable to anti-virus software
- Setup to run in background
- Computer is running fast
- Moving towards P2P
- Use non-suspicious communications channels such as IRC, IM, HTTP(S)
Select all answers that apply.Web applications which enable malicious attackers to inject client-side script into web pages viewed by other users, is called:
- SQL Injections
- Cross-Site Scripting (XSS),
- Injections Flaws
- Cross Site Request Forgery (CSRF)
- Canonicalization