Chapter 4 ■ Communication and Network Security (Domain 4) 85
C. ARP spoofing
D. A Cain attack
- A remote access tool that copies what is displayed on a desktop PC to a remote computer is
an example of what type of technology?
A. Remote node operation
B. Screen scraping
C. Remote control
D. RDP - Which email security solution provides two major usage modes: (1) signed messages that
provide integrity, sender authentication, and nonrepudiation; and (2) an enveloped mes-
sage mode that provides integrity, sender authentication, and confidentiality?
A. S/MIME
B. MOSS
C. PEM
D. DKIM - During a security assessment, Jim discovers that the organization he is working with uses
a multilayer protocol to handle SCADA systems and recently connected the SCADA net-
work to the rest of the organization’s production network. What concern should he raise
about serial data transfers carried via TCP/IP?
A. SCADA devices that are now connected to the network can now be attacked over the
network.
B. Serial data over TCP/IP cannot be encrypted.
C. Serial data cannot be carried in TCP packets.
D. TCP/IP’s throughput can allow for easy denial of service attacks against serial
devices. - What type of key does WEP use to encrypt wireless communications?
A. An asymmetric key
B. Unique key sets for each host
C. A predefined shared static key
D. Unique asymmetric keys for each host