tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    7.Which of the following is considered the best way to protect Personally Identifiable Information (MI) from Web application vulnerabilities?

    A. Use full disk encryption on all hard drives to protect PII

    B. Use cryptographic storage to store all PII

    C. Use encrypted communications protocols to transmit PII

    D. Use a security token to log into all Web applications that use PII



    8. Which of the following is the BEST way to defend against network sniffing?

    A. Use Static IP Address

    B. Using encryption protocols to secure network communications

    C. Register all machines MAC Address M a Centralized Database

    D. Restrict Physical Access to Server Rooms hosting Critical Servers



    < Prev.Page             CEHv9 Home             Next page>