Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following terms describes an attempt to transfer DNS zone data?

A.

Reconnaissance

B.

Dumpster diving

C.

Encapsulation

D.

Spam

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

A.

Encrypt

B.

Acquire

C.

Authenticate

D.

Analyze

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

A.

Brute force attack

B.

Spoofing

C.

PING attack

D.

SYN attack

What are packet sniffers?

A.

Packet sniffers test package security.

B.

Packet sniffers capture the packages as they cross the network.

C.

Packet sniffers encrypt the packages as they cross the network.

D.

Packet sniffers test the packages to verify data integrity.

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

A.

Collusion

B.

Eavesdropping

C.

Phishing

D.

Buffer overflow

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

A.

32

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A.

21

B.

443

C.

80

D.

22

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?

A.

Security

B.

Privacy

C.

Content

D.

General

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

A.

RIP

B.

OSPF

C.

SPX

D.

IGMP

Which of the following is a type of halon?

A.

Halon C

B.

Halon 1900

C.

Halon 1301

D.

Halon 1300

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Which of the following processes removes data from the media so that it is difficult to restore?

A.

Overwriting

B.

Degaussing

C.

Sanitization

D.

Declassification