What has happened?

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your...

November 9, 2021 No Comments READ MORE +

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?A . Multiple access points can be set up on the same channel without any issuesB . Avoid over-saturation of wireless signalsC . So that the access points...

November 9, 2021 No Comments READ MORE +

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.A . deltree commandB . CMOSC . Boot.sysD . Scandisk utilityView AnswerAnswer: C

November 9, 2021 No Comments READ MORE +

Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?

You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents . Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?A...

November 9, 2021 No Comments READ MORE +

What networking protocol language should she learn that routers utilize?

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages . What networking protocol language should she learn that routers utilize?A . ATMB . UDPC . BPGD . OSPFView AnswerAnswer: D

November 9, 2021 No Comments READ MORE +

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?A . The zombie will not send a responseB . 31402C . 31399D . 31401View AnswerAnswer: D

November 9, 2021 No Comments READ MORE +

What type of scan is Jessica going to perform?

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests . What type of scan is Jessica going to perform?A . TracertB . Smurf scanC . Ping traceD . ICMP ping sweepView AnswerAnswer: D

November 9, 2021 No Comments READ MORE +

Which of the following is NOT a graphics file?

Which of the following is NOT a graphics file?A . Picture1.tgaB . Picture2.bmpC . Picture3.nfoD . Picture4.psdView AnswerAnswer: C

November 8, 2021 No Comments READ MORE +

What type of attack has the technician performed?

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends...

November 8, 2021 No Comments READ MORE +

What do you think would be the next sequence of events?

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by...

November 8, 2021 No Comments READ MORE +