- (Topic 2)
Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?
Correct Answer:D
- (Topic 2)
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ACDF
- (Topic 1)
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are- secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABCD
- (Topic 3)
Which of the following statements about a brute force attack is true?
Correct Answer:E
- (Topic 1)
Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?
Correct Answer:B