What ports should you open for SNMP to work through Firewalls?

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame . What ports should you open for SNMP to work through Firewalls? (Choose two.)A ....

October 28, 2021 No Comments READ MORE +

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?A . Keep the information of file for later reviewB . Destroy the evidenceC . Bring the information to the attention of...

October 28, 2021 No Comments READ MORE +

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.A . Gramm-Leach-Bliley ActB . Sarbanes-Oxley 2002C . California SB 1386D . HIPAAView AnswerAnswer: A

October 28, 2021 No Comments READ MORE +

What information do you need to recover when searching a victim’s computer for a crime committed with specific e-mail message?

What information do you need to recover when searching a victim’s computer for a crime committed with specific e-mail message?A . Internet service provider informationB . E-mail headerC . Username and passwordD . Firewall logView AnswerAnswer: B

October 28, 2021 No Comments READ MORE +

Why did this ping sweep only produce a few responses?

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast...

October 28, 2021 No Comments READ MORE +

Why would you want to initiate a DoS attack on a system you are testing?

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network . Why would you want to initiate a DoS attack on a system you are...

October 28, 2021 No Comments READ MORE +

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?A . digital attackB . denial of serviceC . physical attackD . ARP redirectView AnswerAnswer:...

October 28, 2021 No Comments READ MORE +

How many bits is Source Port Number in TCP Header packet?

How many bits is Source Port Number in TCP Header packet?A . 16B . 32C . 48D . 64View AnswerAnswer: A

October 28, 2021 No Comments READ MORE +

One way to identify the presence of hidden partitions on a suspect's hard drive is to:

One way to identify the presence of hidden partitions on a suspect's hard drive is to:A . Add up the total size of all known partitions and compare it to the total size of the hard driveB . Examine the FAT and identify hidden partitions by noting an H in...

October 28, 2021 No Comments READ MORE +

How many law-enforcement computer investigators should you request to staff the lab?

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab . How many law-enforcement computer investigators should you request to staff the lab?A . 8B . 1C . 4D . 2View AnswerAnswer:...

October 27, 2021 No Comments READ MORE +