Tag: security

Questions Related to security

  1. BlueBugging, which lets an attacker make calls on another Bluetooth phone.

  2. BlueJacking, which lets an attacker add contacts to a Bluetooth device's phonebook.

  3. BlueScolding, which lets an attacker trigger program crashes on a Bluetooth device.

  4. BlueSmacking, which crashes a Bluetooth device by sending a "ping-of-death" message.


Correct Option: C

Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?

  1. Ensure users upgrade their devices every 12 months.

  2. Keep firmware and OS versions up to date.

  3. Use mobile antispyware and antivirus software.

  4. Install only Symbian-signed programs or programs from a trusted source.


Correct Option: A
  1. Sentinel Logger

  2. Sentinel Rapid Deployment

  3. Sentinel Auditor

  4. Sentinel Log Manager

  5. Sentinel Audit Manager


Correct Option: B,D
  1. User Application

  2. Identity Server

  3. Collectors

  4. Analyzer

  5. Access Gateway

  6. Access Server


Correct Option: B,E

_________________simplifies how access to information and resource is governed and certified, helping enterprise strike a balance between agility and control

  1. Secure Login

  2. Access Governance Suite

  3. Access Manager

  4. Privileged User Manager


Correct Option: B
  1. Access Manager

  2. Secure Login

  3. Access Governance Suite

  4. Privileged User Manager


Correct Option: B
  1. Secure Login

  2. Access Governance Suite

  3. Access Manager

  4. Privileged User Manager


Correct Option: B
  1. Solutions Continuum

  2. Architecture Vision

  3. Architecture Continuum

  4. Architecture Board

  5. CIO


Correct Option: C