Which of the following statement is true for NTP Stratum Levels?

An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the millisecond of computer clock times in a network of computers. Which of the following statement is true for NTP Stratum Levels?A . Stratum-0 servers are used on the network; they are not directly connected to...

July 18, 2018 No Comments READ MORE +

Which root folder (hive) of registry editor contains a vast array of configuration information for the system, including hardware settings and software settings?

Which root folder (hive) of registry editor contains a vast array of configuration information for the system, including hardware settings and software settings?A . HKEY_USERSB . HKEY_CURRENT_USERC . HKEY_LOCAL_MACHINED . HKEY-CURRENT_CONFIGView AnswerAnswer: C

July 17, 2018 No Comments READ MORE +

Which of the following protocols works under the transport layer of TCP/IP?

TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer. Which of the following protocols works under the transport layer of TCP/IP?A . UDPB . HTTPC ....

July 14, 2018 No Comments READ MORE +

The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.

The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.A . 16-bit identifierB . 24-bit identifierC . 32-bit identifierD . 64-bit identifierView AnswerAnswer: C

July 9, 2018 No Comments READ MORE +

A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?

A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?A . PlaintextB . Single pipe characterC . Multiple...

July 6, 2018 No Comments READ MORE +

Which of the following security logs contains Logs of network and host-based security software?

Computer security logs contain information about the events occurring within an organization's systems and networks. Which of the following security logs contains Logs of network and host-based security software?A . Operating System (OS) logsB . Application logsC . Security software logsD . Audit logsView AnswerAnswer: C

July 6, 2018 No Comments READ MORE +

Email spoofing refers to:

Email spoofing refers to:A . The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual sourceB . The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire...

July 6, 2018 No Comments READ MORE +

SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in _____________ memory.

SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in _____________ memory.A . VolatileB . Non-volatileView AnswerAnswer: B

June 30, 2018 No Comments READ MORE +

Which of the following file in Novel GroupWise stores information about user accounts?

Which of the following file in Novel GroupWise stores information about user accounts?A . ngwguard.dbB . gwcheck.dbC . PRID . EDBE . PRIF . STMView AnswerAnswer: A

June 29, 2018 No Comments READ MORE +

Which command displays the network configuration of the NICs on the system?

The status of the network interface cards (NICs) connected to a system gives information about whether the system is connected to a wireless access point and what IP address is being used. Which command displays the network configuration of the NICs on the system?A . ipconfig /allB . netstatC ....

June 24, 2018 No Comments READ MORE +