Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator for Techpearl Inc. You are configuring the rules for the firewall of the company. You need to allow internal users to access secure external websites. Which of the following firewall rules will you use to accomplish the task?

A.

TCP 172.16.1.0/24 any any 80 HTTP permit

B.

TCP 172.16.1.0/24 any any 25 SMTP permit

C.

TCP 172.16.1.0/24 any any 80 HTTP deny

D.

TCP 172.16.1.0/24 any any 443 HTTPs permit

In an IT organization, some specific tasks require additional detailed controls to ensure that the workers perform their job correctly. What do these detailed controls specify? (Choose three)

A.

How the department handles acquisitions, security, delivery, implementation, and support of IS services

B.

How to lock a user account after unsuccessful logon attempts

C.

How output data is verified before being accepted into an application

D.

The way system security parameters are set

Which of the following types of attack is described in the statement below? "It is a technique employed to compromise the security of network switches. In this attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table."

A.

Man-in-the-middle

B.

Blind spoofing

C.

Dictionary

D.

MAC flooding

In which of the following does a Web site store information such as user preferences to provide customized services to users?

A.

Protocol

B.

ActiveX control

C.

Cookie

D.

Keyword

Which of the following is an attempt to give false information or to deny that a real event or transaction should have occurred?

A.

A DDoS attack

B.

A repudiation attack

C.

A reply attack

D.

A dictionary attack

You work as the Network Administrator for XYZ CORP. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see first five lines of the file /etc/passwd. Which of the following commands should you use to accomplish the task?

A.

head -n 5 /etc/passwd

B.

head 5 -n /etc/passwd

C.

tail -n 5 /etc/passwd

D.

head /etc/passwd

You are tasked with configuring your routers with a minimum security standard that includes the following: A local Username and Password configured on the router A strong privilege mode password Encryption of user passwords Configuring telnet and ssh to authenticate against the router user database Choose the configuration that best meets these requirements.

A.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4 RouterA(config-line)#login

B.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable password n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

C.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

D.

RouterA(config)#service enable-password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login user

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

A.

L0phtcrack

B.

Obiwan

C.

Cain

D.

John the Ripper

Brutus is a password cracking tool that can be used to crack the following authentications: HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 (Post Office Protocol v3) FTP (File Transfer Protocol) SMB (Server Message Block) Telnet Which of the following attacks can be performed by Brutus for password cracking?

A.

Man-in-the-middle attack

B.

Hybrid attack

C.

Replay attack

D.

Brute force attack

E.

Dictionary attack

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. The Manager of the company requires Mark to use tables instead of frames in the Web site. What is the major advantage that a table-structured Web site has over a frame-structured Web site?

A.

Easy maintenance

B.

Speed

C.

Better navigation

D.

Capability of being bookmarked or added to the Favorites folder