Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In the AGULP model, who should be assigned permissions and privileges?

A.

Universal Groups

B.

Local Groups

C.

Individual User Accounts

D.

Global Groups

You are examining a packet capture session in Wire shark and see the packet shown in the accompanying image. Based on what you see, what is the appropriate protection against this type of attempted attack?

A.

Block DNS traffic across the router

B.

Disable forwarding of unsolicited TCP requests

C.

Disable IP-directed broadcast requests

D.

Block UDP packets at the firewall

Why would someone use port 80 for deployment of unauthorized services?

A.

Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue service.

B.

If someone were to randomly browse to the rogue port 80 service they could be compromised.

C.

This is a technique commonly used to perform a denial of service on the local web server.

D.

HTTP traffic is usually allowed outbound to port 80 through the firewall in most environments.

In trace route results, what is the significance of an * result?

A.

A listening port was identified.

B.

A reply was returned in less than a second.

C.

The target host was successfully reached.

D.

No reply was received for a particular hop.

Based on the iptables output below, which type of endpoint security protection has host 192.168.1.17 implemented for incoming traffic on TCP port 22 (SSH) and TCP port 23 (telnet)?

A.

Operating System Control Firewall

B.

Application Control Firewall

C.

Exclusive Logging Analysis

D.

Packet Filtering Firewall

E.

Application Execution Control

Which of the following applications would be BEST implemented with UDP instead of TCP?

A.

A multicast streaming application.

B.

A web browser.

C.

A DNS zone transfer.

D.

A file transfer application.

A web application requires multifactor authentication when a user accesses the application from a home office but does not require this when the user is in the office. What access control model is this describing?

A.

Lattice based access control

B.

Access control list

C.

Variable trust access control

D.

Role based access control

What is TRUE about Workgroups and Domain Controllers?

A.

By default all computers running Windows 2008 can only form Domain Controllers not Workgroups

B.

Workgroups are characterized by higher costs while Domain Controllers by lower costs

C.

You cannot have stand-alone computers in the midst of other machines that are members of a domain

D.

Workgroup computers cannot share resources, only computers running on the same domain can

E.

You can have stand-alone computers in the midst of other machines that are members of a domain.

Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?

A.

NSLOOKUP

B.

IPCONFIG

C.

ARP

D.

IFCONFIG

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

A.

NAT

B.

State Table

C.

Logging

D.

Content filtering