Page 1 out of 26. Viewing questions 1-15 out of 385
Question 1
Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?
A.
B, C, and D
B.
A, C, and E
C.
B, D, and E
D.
A, B, and C
E.
Inexpensive to manage
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 2
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?
A.
RARP
B.
ARP
C.
DNS
D.
RDNS
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
What is the motivation behind SYN/FIN scanning?
A.
The SYN/FIN combination is useful for signaling to certain Trojans.
B.
SYN/FIN packets are commonly used to launch denial of service attacks against BSD hosts.
C.
The crafted SYN/FIN packet sometimes gets past firewalls and filtering routers.
D.
A SYN/FIN packet is used in session hijacking to take over a session.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?
A.
Provides end-to-end data delivery service for user applications
B.
Handles the routing of the data packets over the network
C.
Manages IP addressing and encryption for data packets
D.
Defines the procedures for interfacing with Ethernet devices
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP scope on a private LAN?
A.
127.0.0.100
B.
169.254.1.50
C.
10.254.1.50
D.
172.35.1.100
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two- step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?
A.
Blowfish
B.
DES
C.
SHA-l
D.
Cast
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company's business systems?
A.
It may harm otherwise healthy systems.
B.
It may produce false negative results.
C.
It may generate false positive results.
D.
It may not return enough benefit for the cost.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Which of the following is a benefit to utilizing Cygwin for Windows?
A.
The ability to install a complete Red Hat operating system Install on Windows.
B.
The ability to bring much more powerful scripting capabilities to Windows.
C.
The ability to run a production Apache server.
D.
The ability to install a complete Ubuntu operating system install on Windows.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?
A.
Camera Recordings
B.
Security guards
C.
Encryption
D.
Shredding
E.
Corrective Controls
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?
A.
The server is not using a well-known port.
B.
The server is on a different network.
C.
The client-side source ports are different.
D.
The clients are on different subnets.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following is a standard Unix command that would most likely be used to copy raw file system data for later forensic analysis?
A.
dd
B.
backup
C.
cp
D.
gzip
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Which of the following is NOT a recommended best practice for securing Terminal Services and Remote Desktop?
A.
Require TLS authentication and data encryption whenever possible.
B.
Make sure to allow all TCP 3389 traffic through the external firewall.
C.
Group Policy should be used to lock down the virtual desktops of thin-client users.
D.
Consider using IPSec or a VPN in addition to the RDP encryption if you are concerned about future RDP vulnerabilities.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
When an IIS filename extension is mapped, what does this mean?
A.
Files with the mapped extensions cannot be interpreted by the web server.
B.
The file and all the data from the browser's request are handed off to the mapped interpreter.
C.
The files with the mapped extensions are interpreted by CMD.EXE.
D.
The files with the mapped extensions are interpreted by the web browser.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
Which Linux file lists every process that starts at boot time?
A.
inetd
B.
netsrv
C.
initd
D.
inittab
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
When trace route fails to get a timely response for a packet after three tries, which action will it take?
A.
It will print '* * *' for the attempts and increase the maximum hop count by one.
B.
It will exit gracefully, and indicate to the user that the destination is unreachable.
C.
It will increase the timeout for the hop and resend the packets.
D.
It will print '* * *' for the attempts, increment the TTL and try again until the maximum hop count.