Which of the following password cracking techniques is the attacker trying?
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the...
They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?
An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor...
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.A . Two-factor AuthenticationB . Smart Card AuthenticationC . Single-sign-onD . BiometricView AnswerAnswer: C
Which type of attack is James analyzing?
James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?A . ARP SweepB . ARP misconfigurationC...
What type of network security approach is Daniel adopting?
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . PreventativeB . ReactiveC . RetrospectiveD . Defense-in-depthView AnswerAnswer: B
Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?A . Extreme...
What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?
Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely...
Under which category of an information security policy does AUP fall into?
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?A . System Specific Security Policy (SSSP)B . Incident Response Policy (IRP)C . Enterprise Information Security Policy...
Which type of firewall service is John thinking of implementing?
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?A . Application level gatewayB . Stateful Multilayer InspectionC . Circuit...
What mode of ESP does Jacob need to use to encrypt the IP traffic?
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol...