Why is that?

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?A . Stateful...

January 17, 2023 No Comments READ MORE +

What tool could you use to get this information?

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate....

January 16, 2023 No Comments READ MORE +

What TCP/UDP port does the toolkit program netstat use?

What TCP/UDP port does the toolkit program netstat use?A . Port 7 B. Port 15 C. Port 23 D. Port 69View AnswerAnswer: B

January 16, 2023 No Comments READ MORE +

Why will Jonathan not succeed?

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?A . Only an HTTPS session can be hijacked B. HTTP protocol does not...

January 16, 2023 No Comments READ MORE +

What type of firewall must you implement to abide by this policy?

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by...

January 16, 2023 No Comments READ MORE +

Printing under a Windows Computer normally requires which one of the following files types to be created?

Printing under a Windows Computer normally requires which one of the following files types to be created?A . EME B. MEM C. EMF D. CMEView AnswerAnswer: C

January 16, 2023 No Comments READ MORE +

What organization should Frank submit the log to find out if it is a new vulnerability or not?

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that...

January 16, 2023 No Comments READ MORE +

What could have prevented this information from being stolen from the laptops?

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that...

January 16, 2023 No Comments READ MORE +

This organization maintains a database of hash signatures for known software.

This organization maintains a database of hash signatures for known software.A . International Standards Organization B. Institute of Electrical and Electronics Engineers C. National Software Reference Library D. American National standards InstituteView AnswerAnswer: C

January 16, 2023 No Comments READ MORE +

What are you trying to accomplish here?

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?A . Poison the DNS records...

January 16, 2023 No Comments READ MORE +