Squid is an example of:

Squid is an example of: A. IDS B. caching proxy C. security proxy D. connection proxy E. dialer F. None of the choices. Explanation:Squid is an example of a caching proxy, not a security proxy. It has the main purpose of locallystoring copies of web pages that are popular, with the benefit of saving bandwidth. […]

Read More

which of the following OSI layers are involved?

With Deep packet inspection, which of the following OSI layers are involved? A. Layer 2 through Layer 7 B. Layer 3 through Layer 7 C. Layer 2 through Layer 6 D. Layer 3 through Layer 6 E. Layer 2 through Layer 5 F. None of the choices. Explanation:Deep packet inspection (DPI) is a form of […]

Read More

Pretexting is an act of:

Pretexting is an act of: A. DoS B. social engineering C. eavedropping D. soft coding E. hard coding F. None of the choices. Explanation:Pretexting is the act of creating and using an invented scenario to persuade a target to releaseinformation or perform an action and is usually done over the telephone. It is more than […]

Read More

All Social Engineering techniques are based on flaws in:

All Social Engineering techniques are based on flaws in: A. human logic. B. hardware logic. C. software logic. D. device logic. E. group logic. F. None of the choices. Explanation:Social engineering is a collection of techniques used to manipulate people into performing actionsor divulging confidential information. While similar to a confidence trick or simple fraud, […]

Read More

Which of the following may be deployed in a network as lower cost surveillance and early- warning tools?

Which of the following may be deployed in a network as lower cost surveillance and early- warningtools? A. Honeypots B. Hardware IPSs C. Hardware IDSs D. Botnets E. Stateful inspection firewalls F. Stateful logging facilities G. None of the choices. Explanation:Honeypots, essentially decoy network-accessible resources, could be deployed in a network assurveillance and early-warning tools. […]

Read More