Tag: security

Questions Related to security

  1. BlueBugging, which lets an attacker make calls on another Bluetooth phone.

  2. BlueJacking, which lets an attacker add contacts to a Bluetooth device's phonebook.

  3. BlueScolding, which lets an attacker trigger program crashes on a Bluetooth device.

  4. BlueSmacking, which crashes a Bluetooth device by sending a "ping-of-death" message.


Correct Option: C
  1. Ensure users upgrade their devices every 12 months.

  2. Keep firmware and OS versions up to date.

  3. Use mobile antispyware and antivirus software.

  4. Install only Symbian-signed programs or programs from a trusted source.


Correct Option: A
  1. Sentinel Logger

  2. Sentinel Rapid Deployment

  3. Sentinel Auditor

  4. Sentinel Log Manager

  5. Sentinel Audit Manager


Correct Option: B,D
  1. User Application

  2. Identity Server

  3. Collectors

  4. Analyzer

  5. Access Gateway

  6. Access Server


Correct Option: B,E

Which is Novell's Enterprise Single Sign on Solution

  1. Access Manager

  2. Secure Login

  3. Access Governance Suite

  4. Privileged User Manager


Correct Option: B

Which is Novell's Compliance Management Solution

  1. Secure Login

  2. Access Governance Suite

  3. Access Manager

  4. Privileged User Manager


Correct Option: B
  1. Solutions Continuum

  2. Architecture Vision

  3. Architecture Continuum

  4. Architecture Board

  5. CIO


Correct Option: C