How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets.

How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets.A ....

January 16, 2021 No Comments READ MORE +

How can she accomplish this?

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?A . Jayden can use the commanB . ip binding set.C . Jayden can use the commanD . no ip spoofing.E . She should...

January 16, 2021 No Comments READ MORE +

How many bits encryption does SHA-1 use?

How many bits encryption does SHA-1 use?A . 64 bitsB . 128 bitsC . 256 bitsD . 160 bitsView AnswerAnswer: D

January 16, 2021 No Comments READ MORE +

How does traceroute map the route a packet travels from point A to point B?

How does traceroute map the route a packet travels from point A to point B?A . Uses a TCP timestamp packet that will elicit a time exceeded in transit messageB . Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit messageC...

January 16, 2021 No Comments READ MORE +

What is the most likely cause of this?

While performing a ping sweep of a local subnet you receive an ICMP reply of Code 3/Type 13 for all the pings you have sent out. What is the most likely cause of this?A . The firewall is dropping the packetsB . An in-line IDS is dropping the packetsC ....

January 15, 2021 No Comments READ MORE +

Which statement correctly defines this term?

One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement correctly defines this term?A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to processB . Providers can increase the bandwidth on critical connections to prevent...

January 15, 2021 No Comments READ MORE +

Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network?

Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network?A . Port ScanningB . Single ScanningC . External ScanningD . Vulnerability ScanningView AnswerAnswer: D

January 15, 2021 No Comments READ MORE +

What is War Dialing?

What is War Dialing?A . War dialing involves the use of a program in conjunction with a modem to penetrate the modem/PBX-based systemsB . War dialing is a vulnerability scanning technique that penetrates FirewallsC . It is a social engineering technique that uses Phone calls to trick victimsD . Involves...

January 15, 2021 No Comments READ MORE +

How does a polymorphic shellcode work?

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers?it basically hides the true nature of the shellcode in different disguises. How does a polymorphic shellcode work?A . They encrypt the shellcode by...

January 15, 2021 No Comments READ MORE +

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)A . trueB . falseView AnswerAnswer: A

January 15, 2021 No Comments READ MORE +