1. Right Answer: B
Explanation: Pharming is similar to phishing, but pharming actually pollutes the contents of a computer s DNS cache so that requests to a legitimate site are routed to an alternate site.
2. Right Answer: C
Explanation: Protocol analyzers, or sniffers, collect raw packets from the network and are used by both legitimate security professionals and attackers. Using such a tool, you could tell if the traffic of interest is encrypted.
3. Right Answer: D
Explanation: In a double blind test, the testing team is provided with limited knowledge of the network systems and devices using publicly available information. The organization s security team does not know that an attack is coming.
4. Right Answer: D
Explanation: Due care means that an organization takes all the actions it can reasonably take to prevent security issues or to mitigate damage if security breaches occur.
5. Right Answer: C
Explanation: Common Platform Enumerations (CPE) are methods for describing and classifying operating systems applications and hardware devices.