What TCP/UDP port does the toolkit program netstat use?

What TCP/UDP port does the toolkit program netstat use?A . Port 7B . Port 15C . Port 23D . Port 69View AnswerAnswer: B

October 31, 2021 No Comments READ MORE +

Why will this not be viable?

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web...

October 30, 2021 No Comments READ MORE +

Diskcopy is:

Diskcopy is:A . a utility by AccessDataB . a standard MS-DOS commandC . Digital Intelligence utilityD . dd copying toolView AnswerAnswer: B Explanation: diskcopy is a STANDARD DOS utility. C:WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

October 30, 2021 No Comments READ MORE +

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives.

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:A . HKEY_LOCAL_MACHINEhardwarewindowsstartB...

October 30, 2021 No Comments READ MORE +

Which of the following is NOT a graphics file?

Which of the following is NOT a graphics file?A . Picture1.tgaB . Picture2.bmpC . Picture3.nfoD . Picture4.psdView AnswerAnswer: C

October 30, 2021 No Comments READ MORE +

What principal of social engineering did Julia use?

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the...

October 30, 2021 No Comments READ MORE +

Where should Harold navigate on the computer to find the file?

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?A . %systemroot%system32LSAB . %systemroot%system32driversetcC . %systemroot%repairD . %systemroot%LSAView AnswerAnswer: C

October 30, 2021 No Comments READ MORE +

What group is actively providing tools and creating procedures for testing and validating computer forensics software?

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software . What group is actively providing tools and creating procedures for testing and validating computer forensics software?A . Computer Forensics Tools and Validation Committee (CFTVC)B...

October 30, 2021 No Comments READ MORE +

Which response organization tracks hoaxes as well as viruses?

Which response organization tracks hoaxes as well as viruses?A . NIPCB . FEDCIRCC . CERTD . CIACView AnswerAnswer: D

October 30, 2021 No Comments READ MORE +