What countermeasures could he take to prevent DDoS attacks?
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?A . Enable direct broadcastsB . Disable direct broadcastsC . Disable BGPD . Enable BGPView AnswerAnswer: B
What tool should you use?
You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their...
What type of Penetration Testing is Larry planning to carry out?
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?A . Router Penetration TestingB . DoS Penetration TestingC . Firewall Penetration TestingD . Internal...
How would you permanently erase the data on the hard disk?
You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case . How would you permanently erase the data on the hard disk?A . Throw the hard disk into the fireB . Run...
E-mail logs contain which of the following information to help you in your investigation? (Choose four.)
E-mail logs contain which of the following information to help you in your investigation? (Choose four.)A . user account that was used to send the accountB . attachments sent with the e-mail messageC . unique message identifierD . contents of the e-mail messageE . date and time the message was...
As a CHFI professional, which of the following is the most important to your professional reputation?
As a CHFI professional, which of the following is the most important to your professional reputation?A . Your CertificationsB . The correct, successful management of each and every caseC . The free that you chargeD . The friendship of local law enforcement officersView AnswerAnswer: B
It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?
It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?A . by law, threeB . quite a fewC . only oneD . at least twoView AnswerAnswer: C
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?A . 70 yearsB . the life of the authorC . the life of the author plus 70 yearsD ....
What does ICMP Type 3/Code 13 mean?
What does ICMP Type 3/Code 13 mean?A . Host UnreachableB . Administratively BlockedC . Port UnreachableD . Protocol UnreachableView AnswerAnswer: B
What are you trying to accomplish here?
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe . What are you trying to accomplish here?A . Poison the DNS...