Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

A.

Windows

B.

Red Hat

C.

Solaris

D.

Knoppix

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

A.

Configure Network address translation (NAT).

B.

Disable Windows firewall logging.

C.

Configure Internet Protocol Security (IPSec).

D.

Enable Windows firewall logging.

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

A.

Denial-of-Service

B.

Eavesdropping

C.

Spoofing

D.

Packet manipulation

Which of the following protocols are used by Network Attached Storage (NAS)?

Each correct answer represents a complete solution. Choose all that apply.

A.

Apple Filing Protocol (AFP)

B.

Server Message Block (SMB)

C.

Network File System (NFS)

D.

Distributed file system (Dfs)

Which of the following algorithms produce 160-bit hash values?

Each correct answer represents a complete solution. Choose two.

A.

MD2

B.

MD5

C.

SHA-1

D.

SHA-0

Which of the following statements about testing are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

A stub is a program that simulates a calling unit, and a driver is a program that simulates a called unit.

B.

In unit testing, each independent unit of an application is tested separately.

C.

In integration testing, a developer combines two units that have already been tested into a component.

D.

The bottom-up approach to integration testing helps minimize the need for stubs.

Which of the following statements about digital signature is true?

A.

Digital signature is required for an e-mail message to get through a firewall.

B.

Digital signature verifies the identity of the person who applies it to a document.

C.

Digital signature decrypts the contents of documents.

D.

Digital signature compresses the message to which it is applied.

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

A.

Biometric devices

B.

Intrusion detection systems

C.

Key card

D.

CCTV Cameras

Which of the following is a pillar of Information Assurance CIA triad?

A.

Integrity

B.

Affiliation

C.

Accessibility

D.

Isolation

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.

Which of the following are its significant steps?

Each correct answer represents a complete solution. Choose two.

A.

Awareness and Training Material Effectiveness

B.

Awareness and Training Material Development

C.

Awareness and Training Material Implementation

D.

Awareness and Training Program Design