What should Bob do to avoid this problem?

Bob, a network administrator at Big University, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for...

October 1, 2021 No Comments READ MORE +

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?A . Keyed HashingB . Key StretchingC . SaltingD . Double HashingView AnswerAnswer: C

October 1, 2021 No Comments READ MORE +

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . AH promiscuousB . ESP transport modeC . AH Tunnel modeD . ESP confidentialView AnswerAnswer: B

September 30, 2021 No Comments READ MORE +

Which of the following represents the best practice your business should observe?

Your business has decided to add credit card numbers to the data it backs up to tape. Which of the following represents the best practice your business should observe?A . Do not backup either the credit card numbers or their hashes.B . Encrypt backup tapes that are sent off-site.C ....

September 30, 2021 No Comments READ MORE +

Which of the following parameters describe LM Hash (see exhibit):

Which of the following parameters describe LM Hash (see exhibit): A . IIB . IC . I, II, and IIID . I and IIView AnswerAnswer: C

September 30, 2021 No Comments READ MORE +

Which hacking process is Peer doing?

Peter is surfing the internet looking for if main about DX Company. Which hacking process is Peer doing?A . ScanningB . FootprintingC . EnumerationD . System HackingView AnswerAnswer: B

September 30, 2021 No Comments READ MORE +

Why he cannot see the servers?

The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the network the servers are in the addresses 192.168.1.122.192.168.1.123 and 192.168.1.124. An attacker is trying to find those servers but he can not see them in his scanning. The command he is using is: nmap192.168.1.64/28...

September 30, 2021 No Comments READ MORE +

In which order should he perform these steps?

An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses. In which order should he perform these steps?A . The sequence does not matter. Both steps have to be performed against all hosts.B . First the port scan to identify...

September 30, 2021 No Comments READ MORE +

What cipher is described above?

This asymmetry cipher is based on factoring the product of two large prime numbers. What cipher is described above?A . SHAB . RSAC . MD5D . RC5View AnswerAnswer: B

September 30, 2021 No Comments READ MORE +

Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?A . [cache:]B . [site:]C . [inurl:]D . [link:]View AnswerAnswer: B

September 29, 2021 No Comments READ MORE +