Which type of risk assessment results are typically categorized as low, medium, or high-risk events?
Correct Answer:B
A folder D:FilesMarketing has the following NTFS permissions:
. Administrators: Full Control
. Marketing: Change and Authenticated
. Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
. Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \FILESERVERMARKETING shared folder?
Correct Answer:C
Which of the following SIP methods is used to setup a new session and add a caller?
Correct Answer:D
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BCD
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Correct Answer:AC