This TCP flag instructs the sending system to transmit all buffered data immediately.

This TCP flag instructs the sending system to transmit all buffered data immediately.A . SYNB . RSTC . PSHD . URGE . FINView AnswerAnswer: C

March 14, 2021No CommentsREAD MORE +

There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption, what encryption protocol is being used?

There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption, what encryption protocol is being used? A. WEP...

March 13, 20211 CommentREAD MORE +

What is the attack performed by Bobby in the above scenario?

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an...

March 13, 20211 CommentREAD MORE +

Which of the following protocols Is used by Bella?

Bella, a security professional working at an it firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames. and passwords are shared In plaintext, paving the way for hackers 10 perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends...

March 13, 20211 CommentREAD MORE +

What is the type of attack performed by Samuel in the above scenario?

Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got...

March 13, 2021No CommentsREAD MORE +

How would you protect from these attacks?

Take a look at the following attack on a Web Server using obstructed URL: How would you protect from these attacks?A . Configure the Web Server to deny requests involving "hex encoded" charactersB . Create rules in IDS to alert on strange Unicode requestsC . Use SSL authentication on Web...

March 13, 2021No CommentsREAD MORE +

Which of the following steps for risk assessment methodology refers to vulnerability identification?

Which of the following steps for risk assessment methodology refers to vulnerability identification?A . Determines if any flaws exist in systems, policies, or proceduresB . Assigns values to risk probabilities; Impact values.C . Determines risk probability that vulnerability will be exploited (High. Medium, Low)D . Identifies sources of harm to...

March 13, 20211 CommentREAD MORE +

Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning treeB . Dynamic ARP Inspection (DAI)C . Port securityD . Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B

March 13, 2021No CommentsREAD MORE +

Which Linux-based tool can change any user’s password or activate disabled Windows accounts?

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any...

March 13, 2021No CommentsREAD MORE +

Which of the following is the best countermeasure to encrypting ransomwares?

Which of the following is the best countermeasure to encrypting ransomwares?A . Use multiple antivirus softwaresB . Pay a ransomC . Keep some generation of off-line backupD . Analyze the ransomware to get decryption key of encrypted dataView AnswerAnswer: C

March 12, 2021No CommentsREAD MORE +