Question 81

Which of the following is a reason to implement security logging on a DNS server?
  • Question 82

    You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task?
    Each correct answer represents a part of the solution. Choose all that apply.
  • Question 83

    Which of the following statements about threats are true?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 84

    Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the
    traffic?
  • Question 85

    Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.
    Which of the following Steganography methods is Victor using to accomplish the task?