Select the statement that best describes what is involved in IP address spoofing ?
Hackers steal passwords from mail clients by disguising themselves as administrators
Hackers send data packets with bogus IP source addresses pretendding to be packets from an internet station
Hackers pretend to work for internet security company and ask employees to reveal their passwords
Hackers attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy web site
A hacker can locate a hosts network by using data from the
DNS server
TCP/IP server
Telnet server
SSL server
In the event of a disk failure in a RAID array, what can ensure automatic drive replacement ?
A hot spare
A cold swap
A hot swap
None of the above
What do you need to implement to ensure that your servers are highly available to users ?
Additional memory slots
A RAID array
Clustering
Backup
The identity management component that acts as a repository for user ID and user profile information, that plays a key role in user authentication is
Authentication services
Authorization services
Directory services
Personalization services
Technical components categorized as "Contained" in a technology life cycle represents
Installed and still requiring support
A candidate for immediate transition or may be on a “sunset” path for several years
Strongly recommended for new implementations
Available for limited use in new implementations
Which specification describes how to access a web service ?
UDDI
WSDL
SOAP
ESB
Which specification allows to publish and look up a service in the registry ?
Which of the below XML based technology is not used by Web services ?
RMI
Technical components categorized as "Declining" in a technology life cycle represents