What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

September 24, 2023 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

September 24, 2023 No Comments READ MORE +

Why should the security analyst disable/remove unnecessary ISAPI filters?

Why should the security analyst disable/remove unnecessary ISAPI filters?A . To defend against social engineering attacksB . To defend against webserver attacksC . To defend against jailbreakingD . To defend against wireless attacksView AnswerAnswer: B

September 24, 2023 No Comments READ MORE +

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?A . Overloading Port Address TranslationB . Dynamic Port Address TranslationC . Dynamic Network Address TranslationD . Static Network Address TranslationView AnswerAnswer: D

September 24, 2023 No Comments READ MORE +

Which method of password cracking takes the most time and effort?

Which method of password cracking takes the most time and effort?A . Dictionary attackB . Shoulder surfingC . Rainbow tablesD . Brute forceView AnswerAnswer: D Explanation: Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends...

September 24, 2023 No Comments READ MORE +

In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals?

Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as...

September 23, 2023 No Comments READ MORE +

Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?

Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. Which of the following options...

September 23, 2023 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

September 23, 2023 No Comments READ MORE +

What is the minimum number of network connections in a multihomed firewall?

What is the minimum number of network connections in a multihomed firewall?A . 3B . 5C . 4D . 2View AnswerAnswer: A

September 23, 2023 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

September 23, 2023 No Comments READ MORE +