- (Topic 4)
The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BD
- (Topic 4)
Which of the following Trojans does not use TCP protocol?
Correct Answer:C
- (Topic 4)
Which of the following tools is used for port redirection?
Correct Answer:B
- (Topic 2)
What happens when you scan a broadcast IP address of a network?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:CD
- (Topic 1)
You are conducting a penetration test for a private contractor located in Singapore. The scope extends to all internal hosts controlled by the company, you have gathered necessary hold-harmless and nondisclosure agreements. Which action by your group can incur criminal liability under Chapter 50a, Computer Misuse Act?
Correct Answer:D