You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself...
Continue readingWhy did this ping sweep only produce a few responses?
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your...
Continue readingWhen assessing the risk to the clients network, what step should you take first?
You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?A . Analyzing, categorizing and prioritizing resourcesB . Evaluating the existing perimeter and internal...
Continue readingWhat is the maximum value of a “tinyint” field in most database systems?
What is the maximum value of a “tinyint” field in most database systems?A . 222B . 224 or moreC . 240 or lessD . 225 or more View Answer Answer: D...
Continue readingWhich of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?
Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?A . Hash Key LengthB . C/R Value LengthC . C/R Key LengthD . Hash Value Length View Answer Answer: B...
Continue readingWhich of the following has an offset field that specifies the length of the header and data?
Which of the following has an offset field that specifies the length of the header and data?A . IP HeaderB . UDP HeaderC . ICMP HeaderD . TCP Header View Answer Answer: D...
Continue readingWhich of the following statements is true about the LM hash?
Which of the following statements is true about the LM hash?A . Disabled in Windows Vista and 7 OSsB . Separated into two 8-character stringsC . Letters are converted to the lowercaseD . Padded with NULL to 16 characters View Answer Answer: A...
Continue readingThe IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU. The value of the MTU depends on the type of the transmission link. The design of IP...
Continue readingIdentify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.
Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.A . Information-Protection PolicyB . Special-Access PolicyC . Remote-Access PolicyD . Acceptable-Use Policy View Answer Answer: C...
Continue readingWhich one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?
Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?A . California SB 1386B . Sarbanes-Oxley 2002C...
Continue reading