Which one of the following cannot handle routing protocols properly?

Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers. Which one of the following cannot handle routing protocols properly?A ....

November 3, 2020 No Comments READ MORE +

Paulette presents the following screenshot to her boss so he can inform the clients about necessary changes need to be made. From the screenshot, what changes should the client company make?

Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to...

November 3, 2020 No Comments READ MORE +

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?A . Connect Scanning TechniquesB . SYN Scanning TechniquesC . Stealth Scanning TechniquesD . Port Scanning TechniquesView AnswerAnswer: C

November 2, 2020 No Comments READ MORE +

Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?

Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?A . SYN ScanB . Connect() scanC . XMAS ScanD . Null ScanView AnswerAnswer: A

November 2, 2020 1 Comment READ MORE +

Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.

Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.A . Unannounced TestingB . Double Blind TestingC . Announced TestingD . Blind TestingView AnswerAnswer: B

November 2, 2020 No Comments READ MORE +

A framework is a fundamental structure used to support and resolve complex issues.

A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:A . Microsoft Internet Security FrameworkB . Information System Security Assessment Framework (ISSAF)C ....

November 2, 2020 No Comments READ MORE +

What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?

What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)? A . NIDS are usually a more expensive solution to implement compared to HIDC . Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such...

November 1, 2020 No Comments READ MORE +

Which one of the following ports is used by NTP as its transport layer?

NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network. Which one of the following ports is used by NTP as its transport layer?A . TCP port 152B . UDP port 177C . UDP port 123D . TCP...

November 1, 2020 No Comments READ MORE +

What IDS feature must George implement to meet this requirement?

George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The...

November 1, 2020 No Comments READ MORE +

Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?

The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems. Which of the following information gathering terminologies refers to...

November 1, 2020 No Comments READ MORE +