How can she accomplish this?

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?A . Jayden can use the commanB . ip binding set.C . Jayden can use the commanD . no ip spoofing.E . She should...

January 24, 2021 No Comments READ MORE +

What technique has Jason most likely used?

Jason works in the sales and marketing department for a very large advertising agency located in Atlanta. Jason is working on a very important marketing campaign for his company's largest client. Before the project could be completed and implemented, a competing advertising company comes out with the exact same marketing...

January 24, 2021 No Comments READ MORE +

What is the risk of installing Fake AntiVirus?

Fake Anti-Virus, is one of the most frequently encountered and persistent threats on the web. This malware uses social engineering to lure users into infected websites with a technique called Search Engine Optimization. Once the Fake AV is downloaded into the user's computer, the software will scare them into believing...

January 24, 2021 No Comments READ MORE +

Which of the following statements is incorrect?

Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities. Which of the following statements is incorrect?A . Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.B . Vulnerability scanners can help identify out-of-date software versions,...

January 24, 2021 No Comments READ MORE +

Which of the following statements would NOT be a proper definition for a Trojan Horse?

Which of the following statements would NOT be a proper definition for a Trojan Horse?A . An authorized program that has been designed to capture keyboard keystroke while the user is unaware of such activity being performedB . An unauthorized program contained within a legitimate program. This unauthorized program performs...

January 24, 2021 No Comments READ MORE +

As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A.

As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A. This status of client B is called _________________...

January 24, 2021 No Comments READ MORE +

What category of virus is this?

You receive an e-mail with the following text message. "Microsoft and HP today warned all customers that a new, highly dangerous virus has been discovered which will erase all your files at midnight. If there's a file called hidserv.exe on your computer, you have been infected and your computer is...

January 24, 2021 No Comments READ MORE +

Which type of scan does NOT open a full TCP connection?

Which type of scan does NOT open a full TCP connection?A . Stealth ScanB . XMAS ScanC . Null ScanD . FIN ScanView AnswerAnswer: A

January 23, 2021 No Comments READ MORE +

Which statement correctly defines this term?

One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement correctly defines this term?A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to processB . Providers can increase the bandwidth on critical connections to prevent...

January 23, 2021 No Comments READ MORE +

What type of insider threat would Shayla be considered?

Shayla is an IT security consultant, specializing in social engineering and external penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company's network security. No employees for...

January 23, 2021 No Comments READ MORE +