Question 6 of 559
You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?
    Correct Answer: D

Question 7 of 559
SIMULATION -
Fill in the blank with the appropriate word.
A_______ is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems.
    Correct Answer:

Question 8 of 559
Which of the following protocols is used as a transport protocol for Internet dial-up connections?
    Correct Answer: D

Question 9 of 559
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network.
The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at
Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?
    Correct Answer: C

Question 10 of 559
Which of the following programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited?
    Correct Answer: A