What does ICMP (type 11, code 0) denote?

What does ICMP (type 11, code 0) denote?A . Source QuenchB . Destination UnreachableC . Time ExceededD . Unknown TypeView AnswerAnswer: C

January 26, 2021 No Comments READ MORE +

From the above list identify the user account with System Administrator privileges?

Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter". Here is the output of the SIDs: From the above list identify the user account with System Administrator privileges?A . JohnB . RebeccaC . SheelaD . ShawnE . SomiaF . ChangG . MicahView AnswerAnswer: F

January 26, 2021 No Comments READ MORE +

If you would use both brute force and dictionary combined together to have variations of words, what would you call such an attack?

In the context of password security: a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment...

January 26, 2021 No Comments READ MORE +

Which of the following is NOT an example of default installation?

Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system. Which of the following is NOT an example of default...

January 26, 2021 No Comments READ MORE +

What is the name of this file?

Web servers often contain directories that do not need to be indexed. You create a text file with search engine indexing restrictions and place it on the root directory of the Web Server. User-agent: * Disallow: /images/ Disallow: /banners/ Disallow: /Forms/ Disallow: /Dictionary/ Disallow: /_borders/ Disallow: /_fpclass/ Disallow: /_overlay/ Disallow:...

January 26, 2021 No Comments READ MORE +

In which situations would you want to use anonymizer?

Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure. An anonymizer protects all of your computer's identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit. You can visit Web sites without allowing anyone...

January 26, 2021 No Comments READ MORE +

Which statement correctly defines this term?

One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement correctly defines this term?A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to processB . Providers can increase the bandwidth on critical connections to prevent...

January 25, 2021 No Comments READ MORE +

What should Stephanie use so that she does not get in trouble for surfing the Internet?

Stephanie works as a records clerk in a large office building in downtown Chicago. On Monday, she went to a mandatory security awareness class (Security5) put on by her company's IT department. During the class, the IT department informed all employees that everyone's Internet activity was thenceforth going to be...

January 25, 2021 No Comments READ MORE +

What is the problem with this ASP script (login.asp)?

What is the problem with this ASP script (login.asp)? A . The ASP script is vulnerable to Cross Site Scripting attackB . The ASP script is vulnerable to Session Splice attackC . The ASP script is vulnerable to XSS attackD . The ASP script is vulnerable to SQL Injection attackView...

January 25, 2021 No Comments READ MORE +

How can she accomplish this?

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?A . Jayden can use the commanB . ip binding set.C . Jayden can use the commanD . no ip spoofing.E . She should...

January 24, 2021 No Comments READ MORE +