Which of the following are advantages of Network Intrusion Detection Systems (NIDS)? E. Inexpensive to manage
#1
Answer: C✅ Correct❌ Incorrect
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?
#2
Answer: A✅ Correct❌ Incorrect
What is the motivation behind SYN/FIN scanning?
#3
Answer: C✅ Correct❌ Incorrect
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?
#4
Answer: D✅ Correct❌ Incorrect
Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP scope on a private LAN?
#5
Answer: C✅ Correct❌ Incorrect
When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted toPGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?
#6
Answer: C✅ Correct❌ Incorrect
You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company's business systems?
#7
Answer: C✅ Correct❌ Incorrect
Which of the following is a benefit to utilizing Cygwin for Windows?
#8
Answer: A✅ Correct❌ Incorrect
What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data? E. Corrective Controls
#9
Answer: C✅ Correct❌ Incorrect
Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on theInternet, provided what condition is TRUE?
#10
Answer: C✅ Correct❌ Incorrect
Which of the following is a standard Unix command that would most likely be used to copy raw file system data for later forensic analysis?
#11
Answer: A✅ Correct❌ Incorrect
Which of the following is NOT a recommended best practice for securing Terminal Services and Remote Desktop?
#12
Answer: B✅ Correct❌ Incorrect
When an IIS filename extension is mapped, what does this mean?
#13
Answer: B✅ Correct❌ Incorrect
Which Linux file lists every process that starts at boot time?
#14
Answer: D✅ Correct❌ Incorrect
Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?
#15
Answer: B✅ Correct❌ Incorrect
An employee is currently logged into the corporate web server, without permission. You log into the web server as 'admin" and look for the employee's username:"dmaul" using the "who" command. This is what you get back:
#16
Answer: B✅ Correct❌ Incorrect
Which of the following statements about policy is FALSE?
#17
Answer: D✅ Correct❌ Incorrect
How many bytes does it take to represent the hexadecimal value OxFEDCBA?
#18
Answer: C✅ Correct❌ Incorrect
Which of the following choices accurately describes how PGP works when encrypting email?
#19
Answer: C✅ Correct❌ Incorrect
With regard to defense-in-depth, which of the following statements about network design principles is correct?
#20
Answer: D✅ Correct❌ Incorrect
Which of the following quantifies the effects of a potential disaster over a period of time?
#21
Answer: B✅ Correct❌ Incorrect
Which of the following statements about Microsoft's VPN client software is FALSE?
#22
Answer: B✅ Correct❌ Incorrect
Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?
#23
Answer: C✅ Correct❌ Incorrect
Which of the following systems acts as a NAT device when utilizing VMware in NAT mode?
#24
Answer: D✅ Correct❌ Incorrect
Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.This style of defense-in-depth protection is best described as which of the following?
#25
Answer: A✅ Correct❌ Incorrect
When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?
#26
Answer: B✅ Correct❌ Incorrect
Which of the following elements is the most important requirement to ensuring the success of a business continuity plan? E. Training
#27
Answer: C✅ Correct❌ Incorrect
Which of the following is a new Windows Server 2008 feature for the Remote Desktop Protocol (RDP)?
#28
Answer: D✅ Correct❌ Incorrect
You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?
#29
Answer: C✅ Correct❌ Incorrect
Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?