What type of virus is this that you are testing?
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where...
Why did this ping sweep only produce a few responses?
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only...
When assessing the risk to the clients network, what step should you take first?
You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?A . Analyzing, categorizing and prioritizing resourcesB . Evaluating the...
What is the maximum value of a “tinyint” field in most database systems?
What is the maximum value of a “tinyint” field in most database systems?A . 222B . 224 or moreC . 240 or lessD . 225 or moreView AnswerAnswer: D
Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?
Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?A . Hash Key LengthB . C/R Value LengthC . C/R Key LengthD . Hash Value LengthView AnswerAnswer: B
Which of the following has an offset field that specifies the length of the header and data?
Which of the following has an offset field that specifies the length of the header and data?A . IP HeaderB . UDP HeaderC . ICMP HeaderD . TCP HeaderView AnswerAnswer: D
Which of the following statements is true about the LM hash?
Which of the following statements is true about the LM hash?A . Disabled in Windows Vista and 7 OSsB . Separated into two 8-character stringsC . Letters are converted to the lowercaseD . Padded with NULL to 16 charactersView AnswerAnswer: A
The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU. The value of the MTU depends on the type of the transmission link....
Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.
Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.A . Information-Protection PolicyB . Special-Access PolicyC . Remote-Access PolicyD . Acceptable-Use PolicyView AnswerAnswer: C
Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?
Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?A . California SB...