What is the following command trying to accomplish?
What is the following command trying to accomplish?A . Verify that UDP port 445 is open for the 192.168.0.0 network B. Verify that TCP port 445 is open for the 192.168.0.0 network C. Verify that NETBIOS is running for the 192.168.0.0 network D. Verify that UDP port 445 is closed...
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?A . ICMP header field B. TCP header field C. IP header field D. UDP header fieldView AnswerAnswer: B
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?A . Linux/Unix computers are easier to compromise B. Linux/Unix computers are constantly talking C. Windows computers are constantly talking D. Windows computers will not respond to idle scansView AnswerAnswer: C
Which response organization tracks hoaxes as well as viruses?
Which response organization tracks hoaxes as well as viruses?A . NIPC B. FEDCIRC C. CERT D. CIACView AnswerAnswer: D
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?A . true B. falseView AnswerAnswer: A
Sectors in hard disks typically contain how many bytes?
Sectors in hard disks typically contain how many bytes?A . 256 B. 512 C. 1024 D. 2048View AnswerAnswer: B
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.A . Gramm-Leach-Bliley Act B. Sarbanes-Oxley 2002 C. California SB 1386 D. HIPAAView AnswerAnswer: A
When examining the log files from a Windows IIS Web Server, how often is a new log file created?
When examining the log files from a Windows IIS Web Server, how often is a new log file created?A . the same log is used at all times B. a new log file is created everyday C. a new log file is created each week D. a new log is...
Which part of the Windows Registry contains the user's password file?
Which part of the Windows Registry contains the user's password file?A . HKEY_LOCAL_MACHINE B. HKEY_CURRENT_CONFIGURATION C. HKEY_USER D. HKEY_CURRENT_USERView AnswerAnswer: A
You should make at least how many bit-stream copies of a suspect drive?
You should make at least how many bit-stream copies of a suspect drive?A . 1 B. 2 C. 3 D. 4View AnswerAnswer: B