- All Exams Instant Download
What kind of attack is Susan carrying on?
Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind...
Which of the following is a component of a risk assessment?
Which of the following is a component of a risk assessment?A . Administrative safeguardsB . Physical securityC . DMZD . Logical interfaceView AnswerAnswer: A
Which of these tools would do the SNMP enumeration he is looking for?
Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.A . SNMPUtilB . SNScanC . SNMPScanD . Solarwinds IP...
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?A . Copy the system files from a known good systemB . Perform a trap and traceC . Delete the files and try to determine the sourceD . Reload from a previous...
What is the purpose of DNS AAAA record?
What is the purpose of DNS AAAA record?A . Authorization, Authentication and Auditing recordB . Address prefix recordC . Address database recordD . IPv6 address resolution recordView AnswerAnswer: D