The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.
The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.A . 255.255.255.0B . 18.12.4.1C . 172.168.12.4D . 169.254.254.254View AnswerAnswer: B Explanation: Class B IP addresses range from 128.0.0.0 to...
What IP address class is the network range a part of?
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of? A. Class C B. Class A C. Class B D. Class DView AnswerAnswer: B Explanation: The IP...
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a________identified which helps measure how risky an activity is.
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a________identified which helps measure how risky an activity is.A . Risk SeverityB . Risk MatrixC . Key Risk IndicatorD . Risk levelsView AnswerAnswer: B Explanation: A Risk Matrix is a tool...
What is the name of the authority that verifies the certificate authority in digital certificates?
What is the name of the authority that verifies the certificate authority in digital certificates?A . Directory management systemB . Certificate authorityC . Registration authorityD . Certificate Management systemView AnswerAnswer: C Explanation: In the context of digital certificates, the Registration Authority (RA) is responsible for verifying the identity of entities...
Which filter will he use to view the traffic?
Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view the traffic?A . Tcp.flags==0x000B . Tcp.flags==0000xC . Tcp.flags==000x0D . Tcp.flags==x0000View AnswerAnswer:...
Which of the following password cracking techniques is the attacker trying?
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the...
Which backup method will he select?
Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?A . Normal backupB . Warm backupC . Hot backupD . Cold backupView AnswerAnswer: C Explanation: A hot backup, also known as an online backup or dynamic backup, is the...
Which ISO standard will management decide to implement?
Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?A . ISO/IEC 27004B . ISO/IEC 27002C . ISO/IEC 27006D . ISO/IEC 27005View AnswerAnswer: D Explanation: ISO/IEC 27005 is the standard dedicated to information security risk...
The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.
The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.A . RARPB . ICMPC . DHCPD . ARPView AnswerAnswer: B Explanation: The Internet Control Message Protocol (ICMP) operates at...
Which of the following control measures can help James?
James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help James?A . Strong passwordsB . Reduce the sessions time-out duration for the connection attemptsC . A honeypot in DMZD . Provide network-based anti-virusView AnswerAnswer: C Explanation: Implementing a...