Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?

A.

Buffer Overflow attack

B.

Teardrop attack

C.

Fraggle attack

D.

Snork attack

Which of the following file systems is designed by Sun Microsystems?

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

A.

Port address-based IDS

B.

Network-based IDS (NIDS)

C.

Host-based IDS (HIDS)

D.

Anomaly-based IDS

Which of the following TCP/UDP port is used by the toolkit program netstat?

A.

Port 23

B.

Port 15

C.

Port 7

D.

Port 69

Which of the following commands is used to flush the destination cache for IPv6 interface?

A.

netsh interface ipv6 reset cache

B.

netsh interface ipv6 delete destinationcache

C.

netsh interface ipv6 flush destinationcache

D.

netsh interface ipv6 remove destinationcache

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

A.

Dialler attack

B.

Denial of service

C.

Eavesdropping

D.

Intrusion

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

A.

802.11g

B.

802.11a

C.

802.11u

D.

802.11b

Which of the following is not a Denial of Service (DoS) attack?

A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

Which of the following is an exact duplicate of computer's hard drive?

A.

system image

B.

bit-stream image

C.

data image

D.

drive image

How many bits does IPv6 use in IP addresses?

A.

40 bits

B.

32 bits

C.

64 bits

D.

128 bits

Which of the following ports is used for DNS services?

A.

Port 7

B.

Port 53

C.

Port 80

D.

Port 23

Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

A.

AAAA

B.

HINFO

C.

CNAME

D.

A

Routers work at which layer of the OSI reference model?

A.

Transport

B.

Physical

C.

Presentation

D.

Network

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

A.

Sircam

B.

Stoner

C.

Code Red

D.

Brain

Which of the following partitions contains the system files that are used to start the operating system?

A.

Secondary partition

B.

Boot partition

C.

Primary partition

D.

System partition