Study the following log extract and identify the attack.

Study the following log extract and identify the attack. A . Hexcode AttackB . Cross Site ScriptingC . Multiple Domain Traversal AttackD . Unicode Directory Traversal AttackView AnswerAnswer: D

January 24, 2021No CommentsREAD MORE +

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 113B . 69C . 123D . 161View AnswerAnswer: C

January 23, 2021No CommentsREAD MORE +

Which of the following actions should John take to overcome this problem with the least administrative effort?

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to...

January 23, 2021No CommentsREAD MORE +

Which of the following is assured by the use of a hash?

Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D

January 23, 2021No CommentsREAD MORE +

What protocol used on Linux servers to synchronize the time has stopped working?

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the...

January 23, 2021No CommentsREAD MORE +

Which statement below is true?

Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]”. Which statement below is true?A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.B...

January 22, 2021No CommentsREAD MORE +

Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?A . nmap -A - PnB . nmap -sP -p-65535 -T5C . nmap -sT...

January 22, 2021No CommentsREAD MORE +

Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the...

January 22, 2021No CommentsREAD MORE +

How can he achieve this?

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?A . Privilege EscalationB . Shoulder-SurfingC . Hacking Active DirectoryD . Port ScanningView AnswerAnswer: A

January 21, 2021No CommentsREAD MORE +

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . ESP transport modeB . ESP confidentialC . AH permiscuousD . AH Tunnel modeView AnswerAnswer: A

January 21, 2021No CommentsREAD MORE +