Which of the following terms describes an attempt to transfer DNS zone data?
Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. Choose three.
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
What are packet sniffers?
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?
Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?
Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols work at the network layer?
Each correct answer represents a complete solution. Choose three.
Which of the following is a type of halon?
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
Which of the following processes removes data from the media so that it is difficult to restore?