TAILIEUCHUNG - CompTIA Network+ Certification Study Guide part 74

CompTIA’s Network+ certification Study Guide part 74 is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today’s wireless networking standards. | 716 Appendix C A. Confidentiality B. Integrity C. Availability D. Authentication Correct answer and explanation C. Availability under CIA has not been assured because the resource is not available to the user after they have authenticated. Incorrect answers and explanations Answer A is incorrect because confidentiality has not been breached in this scenario. Answer B is incorrect because integrity has not been breached in this scenario. Although the resource may not be available that does not mean that the integrity of the data has been violated. Answer D is incorrect because authentication is not a component of CIA and the scenario describes that authentication has completed successfully. 3. You are performing a security audit for a company to determine their risk from various attack methods. As part of your audit you work with one of the company s employees to see what activities he performs during the day that could be at risk. As you work with the employee you see him perform the following activities Log in to the corporate network using Kerberos. Access files on a remote system through a Web browser using SSL. Log into a remote UNIX system using SSH. Connect to a POP3 server and retrieve e-mail. Which of these activities is most vulnerable to a sniffing attack A. Logging in to the corporate network using Kerberos. B. Accessing files on a remote system through a Web browser using SSL C. Logging into a remote UNIX system using SSH D. Connecting to a POP3 server and retrieving e-mail Correct answer and explanation D. Connecting to a POP3 server sends the ID and password over the network in a nonencrypted format due to the use of cleartext authentication. This data in addition to the e-mail content itself is consequently vulnerable to being collected when sniffing the network. Incorrect answers and explanations A B and C. Answer A is incorrect because logging into a network using Kerberos is secure from sniffing attacks due to encryption and time stamps. Answer B

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.