Which of the following law does not protect intellectual property?
Answer : A
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
Answer : C
In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?
Answer : D
On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?
Answer : D
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.
Answer : B
Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?
Answer : B
Which of the following tools can be used by a user to hide his identity?
Each correct answer represents a complete solution. Choose all that apply.
Answer : B, C, D