GSEC Exam Question 36

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?
  • GSEC Exam Question 37

    John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are- secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
    Each correct answer represents a complete solution. Choose all that apply.
  • GSEC Exam Question 38

    Your customer is using Windows XP Service pack 1 with wireless zero configuration. Which is the most modern encryption supported with wireless zero configuration?
  • GSEC Exam Question 39

    Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
  • GSEC Exam Question 40

    When an IIS filename extension is mapped, what does this mean?