What is the following command trying to accomplish?

What is the following command trying to accomplish?A . Verify that UDP port 445 is open for the 192.168.0.0 network B. Verify that TCP port 445 is open for the 192.168.0.0 network C. Verify that NETBIOS is running for the 192.168.0.0 network D. Verify that UDP port 445 is closed...

January 24, 2023 No Comments READ MORE +

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?A . ICMP header field B. TCP header field C. IP header field D. UDP header fieldView AnswerAnswer: B

January 24, 2023 No Comments READ MORE +

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?A . Linux/Unix computers are easier to compromise B. Linux/Unix computers are constantly talking C. Windows computers are constantly talking D. Windows computers will not respond to idle scansView AnswerAnswer: C

January 24, 2023 No Comments READ MORE +

Which response organization tracks hoaxes as well as viruses?

Which response organization tracks hoaxes as well as viruses?A . NIPC B. FEDCIRC C. CERT D. CIACView AnswerAnswer: D

January 24, 2023 No Comments READ MORE +

If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?

If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?A . true B. falseView AnswerAnswer: A

January 24, 2023 No Comments READ MORE +

Sectors in hard disks typically contain how many bytes?

Sectors in hard disks typically contain how many bytes?A . 256 B. 512 C. 1024 D. 2048View AnswerAnswer: B

January 23, 2023 No Comments READ MORE +

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.A . Gramm-Leach-Bliley Act B. Sarbanes-Oxley 2002 C. California SB 1386 D. HIPAAView AnswerAnswer: A

January 23, 2023 No Comments READ MORE +

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

When examining the log files from a Windows IIS Web Server, how often is a new log file created?A . the same log is used at all times B. a new log file is created everyday C. a new log file is created each week D. a new log is...

January 23, 2023 No Comments READ MORE +

Which part of the Windows Registry contains the user's password file?

Which part of the Windows Registry contains the user's password file?A . HKEY_LOCAL_MACHINE B. HKEY_CURRENT_CONFIGURATION C. HKEY_USER D. HKEY_CURRENT_USERView AnswerAnswer: A

January 23, 2023 No Comments READ MORE +

You should make at least how many bit-stream copies of a suspect drive?

You should make at least how many bit-stream copies of a suspect drive?A . 1 B. 2 C. 3 D. 4View AnswerAnswer: B

January 23, 2023 No Comments READ MORE +