Q1. An attack that compromises the information stored in the client machine by web browsers for faster retrieval during subsequent visits is called what?
Path traversal
Data structure attacks
Eavesdropping
Cache poisoning
Q2. Which of the following are risk management processes? (This is a drag-and-drop type of question. Here, and for similar drag-and-drop questions, you can draw a line from the list of answers from the left to the empty box on the right.)
Q3. Primary criterion of a Business continuity planning is to ensure that the scoping is _____.
Adequate
Large
Appropriate
Wide coverage
Q4. What is the algorithm used by the Wi-Fi Protected Access 2 (WPA2) protocol for encryption?
RC4
Data Encryption Algorithm (DES)
Advanced Encryption Algorithm (AES)
Triple-DES
Q5. Measurements help in reducing the frequency and severity of security-related issues. Which one of the following is not a right choice for measurements?
Expectations from data privacy requirements
Reduction in number of incidents
More...