What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?A . Man-in-the-middle attack B. Meet-in-the-middle attack C. Replay attack D. Traffic analysis...

October 14, 2022 No Comments READ MORE +

Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning tree B. Dynamic ARP Inspection (DAI) C. Port security D. Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...

October 14, 2022 No Comments READ MORE +

PGP, SSL, and IKE are all examples of which type of cryptography?

PGP, SSL, and IKE are all examples of which type of cryptography?A . Digest B. Secret Key C. Public Key D. Hash AlgorithmView AnswerAnswer: C

October 14, 2022 No Comments READ MORE +

Which of the following programs is usually targeted at Microsoft Office products?

Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virus B. Multipart virus C. Macro virus D. Stealth virusView AnswerAnswer: C Explanation: A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application...

October 14, 2022 No Comments READ MORE +

Which file does the attacker need to modify?

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?A . Boot.ini B. Sudoers C. Networks D. HostsView AnswerAnswer: D

October 14, 2022 No Comments READ MORE +

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTable B. FTP Server rule...

October 14, 2022 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS Detection B. Firewall detection C. TCP/UDP Port scanning D. Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:

October 14, 2022 No Comments READ MORE +

What is the minimum number of network connections in a multihomed firewall?

What is the minimum number of network connections in a multihomed firewall?A . 3 B. 5 C. 4 D. 2View AnswerAnswer: A

October 14, 2022 No Comments READ MORE +

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Which DNS resource record can indicate how long any "DNS poisoning" could last?A . MX B. SOA C. NS D. TIMEOUTView AnswerAnswer: B

October 14, 2022 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

October 13, 2022 No Comments READ MORE +