What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 19, 2022 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS Detection B. Firewall detection C. TCP/UDP Port scanning D. Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:

October 19, 2022 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

October 19, 2022 No Comments READ MORE +

What is the role of test automation in security testing?

What is the role of test automation in security testing?A . It is an option but it tends to be very expensive. B. It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies. C. Test automation is not usable in security due...

October 19, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 19, 2022 No Comments READ MORE +

What is the best security policy concerning this setup?

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?A . Network elements must...

October 19, 2022 No Comments READ MORE +

As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?

As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?A . Use the same machines for DNS and other applications B. Harden DNS servers C. Use split-horizon operation for DNS servers D. Restrict Zone transfers E. Have subnet diversity between...

October 18, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 18, 2022 No Comments READ MORE +

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?A . USER, NICK B. LOGIN, NICK C. USER, PASS D. LOGIN, USERView AnswerAnswer: A

October 18, 2022 No Comments READ MORE +

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?A . symmetric algorithms B. asymmetric algorithms C. hashing algorithms D. integrity algorithmsView AnswerAnswer: C

October 18, 2022 No Comments READ MORE +