What kind of attack does the above scenario depict?

You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/ 8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP's owned by XYZ (Internal) and private IP's are communicating to a Single...

October 10, 2021 No Comments READ MORE +

Which security policy must the security analyst check to see if dial-out modems are allowed?

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the lT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out...

October 10, 2021 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . TCP/UDP Port scanningB . Firewall detectionC . OS DetectionD . Checking if the remote host is aliveView AnswerAnswer: D

October 10, 2021 No Comments READ MORE +

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B

October 9, 2021 No Comments READ MORE +

What type of OS fingerprinting techniques ends specially crafted packets to the remote OS and analyzes the received response?

What type of OS fingerprinting techniques ends specially crafted packets to the remote OS and analyzes the received response?A . PassiveB . ActiveC . ReflectiveD . DistributiveView AnswerAnswer: B

October 9, 2021 No Comments READ MORE +

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?A . PKIB . SOAC . biometricsD . single sign onView AnswerAnswer: A

October 9, 2021 No Comments READ MORE +

Which command can be used to show the current TCP/IP connections?

Which command can be used to show the current TCP/IP connections?A . NetshB . Net use connectionC . NetstatD . Net useView AnswerAnswer: C

October 9, 2021 No Comments READ MORE +

Code injection is a form of attack in which a malicious user.

Code injection is a form of attack in which a malicious user.A . Inserts text into a data field that gets interpreted as codeB . Gets the server to execute arbitrary code using a buffer overflowC . Inserts additional code into the JavaScript running in the browserD . Gains access...

October 9, 2021 No Comments READ MORE +

At what layer of the OSI layer does the encryption and decryption of the message take place?

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the...

October 8, 2021 No Comments READ MORE +

Which of the following organization is being described?

This international organization regulates bi lions of transactions daily and provides security guidelines to protect personally identifiable information (PI). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach. Which of the following organization is being described?A . Institute of...

October 8, 2021 No Comments READ MORE +