What has happened?
You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your...
When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?
When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?A . Multiple access points can be set up on the same channel without any issuesB . Avoid over-saturation of wireless signalsC . So that the access points...
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.A . deltree commandB . CMOSC . Boot.sysD . Scandisk utilityView AnswerAnswer: C
Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?
You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents . Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?A...
What networking protocol language should she learn that routers utilize?
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages . What networking protocol language should she learn that routers utilize?A . ATMB . UDPC . BPGD . OSPFView AnswerAnswer: D
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?A . The zombie will not send a responseB . 31402C . 31399D . 31401View AnswerAnswer: D
What type of scan is Jessica going to perform?
Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests . What type of scan is Jessica going to perform?A . TracertB . Smurf scanC . Ping traceD . ICMP ping sweepView AnswerAnswer: D
Which of the following is NOT a graphics file?
Which of the following is NOT a graphics file?A . Picture1.tgaB . Picture2.bmpC . Picture3.nfoD . Picture4.psdView AnswerAnswer: C
What type of attack has the technician performed?
Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends...
What do you think would be the next sequence of events?
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by...