Which of the following password cracking techniques is the attacker trying?

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the...

May 17, 2023 No Comments READ MORE +

If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?A . Water B. Wet chemical C. Dry chemical D. Raw chemicalView AnswerAnswer: C

May 17, 2023 No Comments READ MORE +

What is the first step they should do to create the network vulnerability assessment plan?

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how...

May 1, 2021 No Comments READ MORE +

If a network is at risk from unskilled individuals, what type of threat is this?

If a network is at risk from unskilled individuals, what type of threat is this?A . External ThreatsB . Structured ThreatsC . Unstructured ThreatsD . Internal ThreatsView AnswerAnswer: C

May 1, 2021 No Comments READ MORE +

What command will he use to check the ports applications open?

Alex is administrating the firewall in the organization's network. What command will he use to check the ports applications open?A . Netstat -anB . Netstat -oC . Netstat -aD . Netstat -aoView AnswerAnswer: A

April 30, 2021 No Comments READ MORE +

At what layer of the OSI model does an IPsec tunnel function on?

Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?A . They work on the session layer.B . They function...

April 29, 2021 No Comments READ MORE +

What are they?

Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........A . VulnerabilityB . ImpactC . AttackD . ThreatView...

April 29, 2021 No Comments READ MORE +

What are the other f unction(s) of the device?

A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)A . Provides access memory, achieving high efficiencyB . Assigns user addressesC . Enables input/output (I/O) operationsD . Manages security keysView AnswerAnswer: B,C,D

April 29, 2021 No Comments READ MORE +

Which type of filter will be used to detect this on the network?

Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. Which type of filter will be used to detect this on the network?A . Tcp.srcport==7 and udp.srcport==7B . Tcp.srcport==7 and udp.dstport==7C . Tcp.dstport==7 and udp.srcport==7D . Tcp.dstport==7...

April 29, 2021 No Comments READ MORE +

What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you...

April 28, 2021 No Comments READ MORE +