What does a firewall check to prevent particular ports and applications from getting packets into an organization?

What does a firewall check to prevent particular ports and applications from getting packets into an organization?A . Transport layer port numbers and application layer headersB . Presentation layer headers and the session layer port numbersC . Network layer headers and the session layer port numbersD . Application layer port...

May 10, 2025 No Comments READ MORE +

What type of message does the client send to the server in order to begin this negotiation?

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?A . ACKB . SYNC . RSTD . SYN-ACKView AnswerAnswer: B

May 9, 2025 No Comments READ MORE +

What is a possible source of this problem?

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not...

May 9, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

May 8, 2025 No Comments READ MORE +

What two conditions must a digital signature meet?

What two conditions must a digital signature meet?A . Has to be the same number of characters as a physical signature and must be unique.B . Has to be unforgeable, and has to be authentic.C . Must be unique and have special characters.D . Has to be legible and neat.View...

May 8, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

May 7, 2025 No Comments READ MORE +

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?A . Behavioral basedB . Heuristics basedC . Honeypot basedD . Cloud basedView AnswerAnswer: D

May 7, 2025 No Comments READ MORE +

What does the CoX flag do in an Nmap scan?

What does the CoX flag do in an Nmap scan?A . Perform an eXpress scanB . Output the results in truncated format to the screenC . Output the results in XML format to a fileD . Perform an Xmas scanView AnswerAnswer: C Explanation: https://nmap.org/book/man-output.html -oX <filespec> - Requests that XML...

May 7, 2025 No Comments READ MORE +

Which type of security feature stops vehicles from crashing through the doors of a building?

Which type of security feature stops vehicles from crashing through the doors of a building?A . BollardsB . ReceptionistC . MantrapD . TurnstileView AnswerAnswer: A

May 6, 2025 No Comments READ MORE +

What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to...

May 5, 2025 No Comments READ MORE +