Question 11
Which of the following protocols is used to report an error in datagram processing?
Question 12
Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute?
Question 13
Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
Question 14
Adam, a malicious hacker, has just succeeded in stealing a secure cookie via a XSS attack. He is able to replay the cookie even while the session is valid on the server. Which of the following is the most likely reason of this cause?
Question 15
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi
wireless network?
wireless network?

