Which type of attack is James analyzing?
James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?A . ARP SweepB . ARP misconfigurationC...
What needs to happen to force this server to use Windows Authentication?
According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?A . Edit the...
What are they?
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........A . VulnerabilityB . ImpactC . AttackD . ThreatView...
Which of the following countermeasure(s) should be added to deal with future malware incidents?
The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident. Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)A...
How should this risk be categorized in the risk matrix?
The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the risk matrix?A . HighB . MediumC . ExtremeD . LowView AnswerAnswer: C Explanation:...
What is the best option to do this job?
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?A . Install a CCTV with cameras pointing to the entrance doors...
What type of UPS has Kyle purchased?
Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do...
Which type of RAM will he select for his RAID system?
Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns. Which type of RAM will he select for...
What type of network security approach is Daniel adopting?
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . PreventativeB . ReactiveC . RetrospectiveD . Defense-in-depthView AnswerAnswer: B Explanation: Daniel is adopting a Reactive network security approach. This approach involves monitoring network...
Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?
John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?A ....