Which of the following is considered as one of the most reliable forms of TCP scanning?

Which of the following is considered as one of the most reliable forms of TCP scanning?A . TCP Connect/Full Open ScanB . Half-open ScanC . NULL ScanD . Xmas ScanView AnswerAnswer: A

September 26, 2020 No Comments READ MORE +

Which of the following types of firewalls can protect against SQL injection attacks?

Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?A . Data-driven firewallB . Stateful firewallC . Packet...

September 26, 2020 No Comments READ MORE +

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?A . Produces less false positivesB . Can identify unknown attacksC . Requires vendor updates for a new threatD . Cannot deal with encrypted network trafficView AnswerAnswer: B

September 25, 2020 No Comments READ MORE +

A virus that attempts to install itself inside the file it is infecting is called?

A virus that attempts to install itself inside the file it is infecting is called?A . Tunneling virusB . Cavity virusC . Polymorphic virusD . Stealth virusView AnswerAnswer: B

September 25, 2020 No Comments READ MORE +

What command is used to determine if the entry is present in DNS cache?

DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed. What command is used to determine...

September 25, 2020 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

September 25, 2020 No Comments READ MORE +

What kind of attack does the above scenario depict?

You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public...

September 25, 2020 No Comments READ MORE +

What is the fastest way she can accomplish this with Nmap?

Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.A . nmap -sn -sF 10.1.0.0/16 445B . nmap -p 445 -n -T4 Copen 10.1.0.0/16C . nmap -s 445 -sU...

September 25, 2020 No Comments READ MORE +

What should Bob do to avoid this problem?

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for malware...

September 25, 2020 No Comments READ MORE +

Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...

September 25, 2020 No Comments READ MORE +