What term is commonly used when referring to this type of testing?

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring to this type of testing?A . RandomizingB . BoundingC...

May 10, 2025 No Comments READ MORE +

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

What does a firewall check to prevent particular ports and applications from getting packets into an organization?A . Transport layer port numbers and application layer headersB . Presentation layer headers and the session layer port numbersC . Network layer headers and the session layer port numbersD . Application layer port...

May 10, 2025 No Comments READ MORE +

What type of message does the client send to the server in order to begin this negotiation?

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?A . ACKB . SYNC . RSTD . SYN-ACKView AnswerAnswer: B

May 9, 2025 No Comments READ MORE +

What is a possible source of this problem?

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not...

May 9, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

May 8, 2025 No Comments READ MORE +

What two conditions must a digital signature meet?

What two conditions must a digital signature meet?A . Has to be the same number of characters as a physical signature and must be unique.B . Has to be unforgeable, and has to be authentic.C . Must be unique and have special characters.D . Has to be legible and neat.View...

May 8, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

May 7, 2025 No Comments READ MORE +

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?A . Behavioral basedB . Heuristics basedC . Honeypot basedD . Cloud basedView AnswerAnswer: D

May 7, 2025 No Comments READ MORE +

What does the CoX flag do in an Nmap scan?

What does the CoX flag do in an Nmap scan?A . Perform an eXpress scanB . Output the results in truncated format to the screenC . Output the results in XML format to a fileD . Perform an Xmas scanView AnswerAnswer: C Explanation: https://nmap.org/book/man-output.html -oX <filespec> - Requests that XML...

May 7, 2025 No Comments READ MORE +

Which type of security feature stops vehicles from crashing through the doors of a building?

Which type of security feature stops vehicles from crashing through the doors of a building?A . BollardsB . ReceptionistC . MantrapD . TurnstileView AnswerAnswer: A

May 6, 2025 No Comments READ MORE +