Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . ESP transport mode B. ESP confidential C. AH permiscuous D. AH Tunnel modeView AnswerAnswer: A

October 13, 2022 No Comments READ MORE +

How did the attacker accomplish this hack?

Joseph was the Web site administrator for the Mason Insurance in New York, who's main Web site was located at www.masonins.com. Joseph uses his laptop computer regularly to administer the Web site. One night, Joseph received an urgent phone call from his friend, Smith. According to Smith, the main Mason...

October 13, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 13, 2022 No Comments READ MORE +

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . SFTP B. Ipsec C. SSL D. FTPSView AnswerAnswer: B Explanation: https://en.wikipedia.org/wiki/IPsec Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data...

October 13, 2022 No Comments READ MORE +

Study the snort rule given below:

Study the snort rule given below: From the options below, choose the exploit against which this rule applies.A . WebDav B. SQL Slammer C. MS Blaster D. MyDoomView AnswerAnswer: C

October 13, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 12, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 12, 2022 No Comments READ MORE +

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?A . Birthday B. Brute force C. Man-in-the-middle D. SmurfView AnswerAnswer: B

October 12, 2022 No Comments READ MORE +

Which system consists of a publicly available set of databases that contain domain name registration contact information?

Which system consists of a publicly available set of databases that contain domain name registration contact information?A . WHOIS B. CAPTCHA C. IANA D. IETFView AnswerAnswer: A

October 12, 2022 No Comments READ MORE +

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.A . DNSSEC B. Resource records C. Resource transfer D. Zone transferView AnswerAnswer: A Explanation: The Domain...

October 12, 2022 No Comments READ MORE +