GSEC Exam Question 36
Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?
GSEC Exam Question 37
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are- secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
GSEC Exam Question 38
Your customer is using Windows XP Service pack 1 with wireless zero configuration. Which is the most modern encryption supported with wireless zero configuration?
GSEC Exam Question 39
Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
GSEC Exam Question 40
When an IIS filename extension is mapped, what does this mean?