Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements about policy is FALSE?

A.

A well-written policy contains definitions relating to "what" to do.

B.

A well-written policy states the specifics of "how" to do something.

C.

Security policy establishes what must be done to protect information stored on computers.

D.

Policy protects people who are trying to do the right thing.

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses Internet Protocol (IP) for data integrity.

B.

It uses Authentication Header (AH) for data integrity.

C.

It uses Password Authentication Protocol (PAP) for user authentication.

D.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?

A.

Detective

B.

Preventive

C.

Responsive

D.

Corrective

An application developer would like to replace Triple DES in their software with a stronger algorithm of the same type. Which of the following should they use?

A.

RC5

B.

AES

C.

RSA

D.

SHA

Which field in the IPv6 header is used for QoS. or specifying the priority of the packet?

A.

Hop Limit

B.

Traffic Class

C.

Version

D.

Next Header

Which of the following statements best describes where a border router is normally placed?

A.

Between your firewall and your internal network

B.

Between your firewall and DNS server

C.

Between your ISP and DNS server

D.

Between your ISP and your external firewall

Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap.

What is the source port number?

A.

878733706

B.

123

C.

443

D.

878732274

E.

36480

F.

2398730476

G.

1432

Where is the source address located in an IPv4 header?

A.

At an offset of 20 bytes

B.

At an offset of 8 bytes

C.

At an offset of 16 bytes

D.

At an offset of 12 bytes

Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?

Hints

• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory /home /giac /PasswordHashing/

• Run Hashcat in straight mode (flag -a 0) to crack the MD5 hashes (flag -m 500) In the shadow file.

• Use the hash values from the Hashcat output file and the shadow file to match the cracked password with the user name.

• If required, a backup copy of the original files can be found in the shadowbackup directory.

A.

52345234

B.

YOuRF ether?

C.

symbiote

D.

Volcano

E.

QX689PJ688

F.

LlqMM@qe

G.

Noregrets2

Analyze the screenshot below. In what order should the vulnerabilities be remediated?

A.

D, C, B, A

B.

C, D, B, A

C.

C, D, A, B

D.

B, A, D, C,