In the process of public key cryptography, which of the following is true?
Answer : E
As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on Physical and Environmental Security?
Answer : B
During a one week investigation into the security of your network you work on identifying the information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is the information stored in the Whois lookup of your organizational website. Of the following, what pieces of information can be identified via this method?
Answer : A,B,C,D
You are aware of the significance and security risk that Social Engineering plays on your company. Of the following Scenarios, select those that, just as described, represent potentially dangerous Social
Engineering:
Answer : D,E
During the review of the security logs you notice some unusual traffic. It seems that a user has connected to your Web site ten times in the last week, and each time has visited every single page on the site. You are concerned this may be leading up to some sort of attack.
What is this user most likely getting ready to do?
Answer : A