Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?A . High-interaction honeypotB . Medium-interaction honeypotC . HoneydD . Low-interaction honeypotView AnswerAnswer: A Explanation: A high-interaction honeypot offers a vast amount of information...
Which of the following e-mail crimes is Peter committing?
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends a large number of unsolicited commercial e-mail (UCE) messages to these addresses. Which of the following e-mail crimes is Peter committing?A . E-mail spamB . E-mail stormC . E-mail...
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.A . Wireless snifferB . Spectrum analyzerC . Protocol analyzerD . Performance MonitorView AnswerAnswer: AC Explanation: Protocol analyzer...
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers
FILL BLANK Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers.View AnswerAnswer: rootkit Explanation: A rootkit is a set of tools that take Administrative control of a...
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi wireless network?
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi wireless network?A . SpammingB . War drivingC . War dialingD . WarchalkingView AnswerAnswer: D Explanation: Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi wireless network. Having...
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?A . PPTP VPNB . Remote access VPNC . Extranet-based VPND . Intranet-based VPNView AnswerAnswer: C Explanation: An extranet-based VPN uses the...
Which of the following is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN)?
Which of the following is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN)?A . PPPB . Frame relayC . ISDNE . 25F . NoneView AnswerAnswer: B Explanation: Frame relay is a telecommunication service...
Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient
FILL BLANK Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.View AnswerAnswer: NetRanger Explanation: NetRanger is the complete network configuration and information toolkit that includes the following tools:...
Which of the following protocols uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets?
Which of the following protocols uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets?A . PPTPB . ESPC . LWAPPD . SSTPView AnswerAnswer: A Explanation: The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over...
Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments?
Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments?A . Network News Transfer ProtocolB . Lightweight Presentation ProtocolC . Internet Relay Chat ProtocolD . Dynamic Host Configuration ProtocolView AnswerAnswer: B Explanation:...