Which of the following describes the characteristics of a Boot Sector Virus?

Which of the following describes the characteristics of a Boot Sector Virus?A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program. B. Moves the MBR to another location on the RAM and copies itself to the original location of the...

October 20, 2022 No Comments READ MORE +

What is the proper response for a NULL scan if the port is closed?

What is the proper response for a NULL scan if the port is closed?A . SYN B. ACK C. FIN D. PSH E. RST F. No responseView AnswerAnswer: E

October 20, 2022 No Comments READ MORE +

What is a possible source of this problem?

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not...

October 19, 2022 No Comments READ MORE +

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?A . Macro virus B. Stealth/Tunneling virus C. Cavity virus D. Polymorphic virusView AnswerAnswer: B

October 19, 2022 No Comments READ MORE +

Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning tree B. Dynamic ARP Inspection (DAI) C. Port security D. Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...

October 19, 2022 No Comments READ MORE +

Which one of the following tools the hacker probably used to inject HTML code?

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...

October 19, 2022 No Comments READ MORE +

What tool should the analyst use to perform a Blackjacking attack?

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing C Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str......

October 19, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 19, 2022 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS Detection B. Firewall detection C. TCP/UDP Port scanning D. Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:

October 19, 2022 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

October 19, 2022 No Comments READ MORE +