Tag: architecture

Questions Related to architecture

  1. Hackers steal passwords from mail clients by disguising themselves as administrators

  2. Hackers send data packets with bogus IP source addresses pretendding to be packets from an internet station

  3. Hackers pretend to work for internet security company and ask employees to reveal their passwords

  4. Hackers attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy web site


Correct Option: B

A hacker can locate a hosts network by using data from the

  1. DNS server

  2. TCP/IP server

  3. Telnet server

  4. SSL server


Correct Option: A
  1. Installed and still requiring support

  2. A candidate for immediate transition or may be on a “sunset” path for several years

  3. Strongly recommended for new implementations

  4. Available for limited use in new implementations


Correct Option: A
  1. Installed and still requiring support

  2. A candidate for immediate transition or may be on a “sunset” path for several years

  3. Strongly recommended for new implementations

  4. Available for limited use in new implementations


Correct Option: B