How can Fred accomplish this?
Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?A . Fred can accomplish this by sending...
Which of the following has occurred?
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are...
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?A . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.B . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.C ....
What is the first step that the bank should take before enabling the audit feature?
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?A . Perform a vulnerability scan of the system.B . Determine the impact of enabling...
What is the recommended architecture in terms of server placement?
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?A . All three servers need to be placed internallyB . A web server facing...
How would you proceed?
You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to...
Why containers are less secure that virtual machines?
Why containers are less secure that virtual machines?A . Host OS on containers has a larger surface attack.B . Containers may full fill disk space of the host.C . A compromise container may cause a CPU starvation of the host.D . Containers are attached to the same virtual network.View AnswerAnswer:...
Which of the following best describes this type of system?
Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?A . A biometric system that bases authentication decisions on behavioral attributes.B . A biometric system that bases authentication decisions on physical attributes.C . An authentication system...
Which of the following tools can be used to perform a zone transfer?
Which of the following tools can be used to perform a zone transfer?A . NSLookupB . FingerC . DigD . Sam SpadeE . HostF . NetcatG . NeotraceView AnswerAnswer: A,C,D,E
Which of the following options can be useful to ensure the integrity of the data?
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information...