What kind of attack is Susan carrying on?

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind...

January 14, 2021No CommentsREAD MORE +

Which of the following is a component of a risk assessment?

Which of the following is a component of a risk assessment?A . Administrative safeguardsB . Physical securityC . DMZD . Logical interfaceView AnswerAnswer: A

January 14, 2021No CommentsREAD MORE +

Which of these tools would do the SNMP enumeration he is looking for?

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.A . SNMPUtilB . SNScanC . SNMPScanD . Solarwinds IP...

January 13, 2021No CommentsREAD MORE +

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?A . Copy the system files from a known good systemB . Perform a trap and traceC . Delete the files and try to determine the sourceD . Reload from a previous...

January 13, 2021No CommentsREAD MORE +

What is the purpose of DNS AAAA record?

What is the purpose of DNS AAAA record?A . Authorization, Authentication and Auditing recordB . Address prefix recordC . Address database recordD . IPv6 address resolution recordView AnswerAnswer: D

January 13, 2021No CommentsREAD MORE +