What kind of attack does the above scenario depict?
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/ 8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP's owned by XYZ (Internal) and private IP's are communicating to a Single...
Which security policy must the security analyst check to see if dial-out modems are allowed?
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the lT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out...
Which is the first step followed by Vulnerability Scanners for scanning a network?
Which is the first step followed by Vulnerability Scanners for scanning a network?A . TCP/UDP Port scanningB . Firewall detectionC . OS DetectionD . Checking if the remote host is aliveView AnswerAnswer: D
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B
What type of OS fingerprinting techniques ends specially crafted packets to the remote OS and analyzes the received response?
What type of OS fingerprinting techniques ends specially crafted packets to the remote OS and analyzes the received response?A . PassiveB . ActiveC . ReflectiveD . DistributiveView AnswerAnswer: B
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?A . PKIB . SOAC . biometricsD . single sign onView AnswerAnswer: A
Which command can be used to show the current TCP/IP connections?
Which command can be used to show the current TCP/IP connections?A . NetshB . Net use connectionC . NetstatD . Net useView AnswerAnswer: C
Code injection is a form of attack in which a malicious user.
Code injection is a form of attack in which a malicious user.A . Inserts text into a data field that gets interpreted as codeB . Gets the server to execute arbitrary code using a buffer overflowC . Inserts additional code into the JavaScript running in the browserD . Gains access...
At what layer of the OSI layer does the encryption and decryption of the message take place?
User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the...
Which of the following organization is being described?
This international organization regulates bi lions of transactions daily and provides security guidelines to protect personally identifiable information (PI). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach. Which of the following organization is being described?A . Institute of...