What have you discovered?

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/show/config After...

November 15, 2021 No Comments READ MORE +

What type of firewall must you implement to abide by this policy?

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers . What type of firewall must you implement to abide...

November 14, 2021 No Comments READ MORE +

Sectors in hard disks typically contain how many bytes?

Sectors in hard disks typically contain how many bytes?A . 256B . 512C . 1024D . 2048View AnswerAnswer: B

November 14, 2021 No Comments READ MORE +

What is a Virtual Environment?

Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this...

November 14, 2021 No Comments READ MORE +

Item 2If you come across a sheepdip machine at your client site, what would you infer?

Item 2If you come across a sheepdip machine at your client site, what would you infer?A . A sheepdip coordinates several honeypotsB . A sheepdip computer is another name for a honeypotC . A sheepdip computer is used only for virus-checking.D . A sheepdip computer defers a denial of service...

November 14, 2021 No Comments READ MORE +

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?A . evidence must be handled in the same way regardless of the type of caseB . evidence procedures are not important unless you work...

November 14, 2021 No Comments READ MORE +

What is that code called?

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document . What is that code called?A . the Microsoft Virtual Machine IdentifierB . the Personal Application ProtocolC . the Globally Unique IDD . the Individual ASCII StringView...

November 14, 2021 No Comments READ MORE +

Why should you note all cable connections for a computer you want to seize as evidence?

Why should you note all cable connections for a computer you want to seize as evidence?A . to know what outside connections existedB . in case other devices were connectedC . to know what peripheral devices existD . to know what hardware existedView AnswerAnswer: A

November 14, 2021 No Comments READ MORE +

Why will this not be viable?

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web...

November 14, 2021 No Comments READ MORE +

The offset in a hexadecimal code is:

The offset in a hexadecimal code is:A . The last byte after the colonB . The 0x at the beginning of the codeC . The 0x at the end of the codeD . The first byte after the colonView AnswerAnswer: B

November 14, 2021 No Comments READ MORE +