What does the CoX flag do in an Nmap scan?
What does the CoX flag do in an Nmap scan?A . Perform an eXpress scanB . Output the results in truncated format to the screenC . Output the results in XML format to a fileD . Perform an Xmas scanView AnswerAnswer: C Explanation: https://nmap.org/book/man-output.html -oX <filespec> - Requests that XML...
Which type of security feature stops vehicles from crashing through the doors of a building?
Which type of security feature stops vehicles from crashing through the doors of a building?A . BollardsB . ReceptionistC . MantrapD . TurnstileView AnswerAnswer: A
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to...
Which of the following options can be useful to ensure the integrity of the data?
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information...
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . ESP transport modeB . ESP confidentialC . AH permiscuousD . AH Tunnel modeView AnswerAnswer: A
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
Which regulation defines security and privacy controls for Federal information systems and organizations?
Which regulation defines security and privacy controls for Federal information systems and organizations?A . HIPAAB . EU Safe HarborC . PCI-DSSD . NIST-800-53View AnswerAnswer: D Explanation: NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems except those related to national security....
In what kind of system would you find the following string of characters used as a rule within its configuration?
You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTableB . FTP Server ruleC...
Which of the following is a low-tech way of gaining unauthorized access to systems?
Which of the following is a low-tech way of gaining unauthorized access to systems?A . Social EngineeringB . EavesdroppingC . ScanningD . SniffingView AnswerAnswer: A
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virusB . Multipart virusC . Macro virusD . Stealth virusView AnswerAnswer: C Explanation: A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application...