Which of the following is the BEST way to defend against network sniffing?
Which of the following is the BEST way to defend against network sniffing?A . Using encryption protocols to secure network communicationsB . Register all machines MAC Address in a Centralized DatabaseC . Use Static IP AddressD . Restrict Physical Access to Server Rooms hosting Critical ServersView AnswerAnswer: A
What would you enter if you wanted to perform a stealth scan using Nmap?
What would you enter if you wanted to perform a stealth scan using Nmap?A . nmap -sMB . nmap -sUC . nmap -sSD . nmap -sTView AnswerAnswer: C
Why containers are less secure that virtual machines?
Why containers are less secure that virtual machines?A . Host OS on containers has a larger surface attack.B . Containers may full fill disk space of the host.C . A compromise container may cause a CPU starvation of the host.D . Containers are attached to the same virtual network.View AnswerAnswer:...
What would be a good step to have in the procedures for a situation like this?
The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a...
How would you proceed?
The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below: You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a...
Which of the following requirements would best fit under the objective, "Implement strong access control measures"?
The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?A . Regularly...
How did the attacker accomplish this hack?
Joseph was the Web site administrator for the Mason Insurance in New York, who's main Web site was located at www.masonins.com. Joseph uses his laptop computer regularly to administer the Web site. One night, Joseph received an urgent phone call from his friend, Smith. According to Smith, the main Mason...
Which of the following tiers of the container technology architecture Is Abel currently working in?
Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying...
What is the proper response for a NULL scan if the port is open?
What is the proper response for a NULL scan if the port is open?A . SYNB . ACKC . FIND . PSHE . RSTF . No responseView AnswerAnswer: F
What happens when the CAM table becomes full?
Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch. In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses...