Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Port securityB . A Layer 2 Attack Prevention Protocol (LAPP)C . Dynamic ARP inspection (DAI)D . Spanning treeView AnswerAnswer: C

October 12, 2020 No Comments READ MORE +

In the field of cryptanalysis, what is meant by a “rubber-hose" attack?

In the field of cryptanalysis, what is meant by a “rubber-hose" attack?A . Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.B . Extraction of cryptographic secrets through coercion or torture.C . Forcing the targeted key stream through a hardware-accelerated device such...

October 11, 2020 No Comments READ MORE +

What would be a good step to have in the procedures for a situation like this?

The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a...

October 11, 2020 No Comments READ MORE +

What protocol used on Linux servers to synchronize the time has stopped working?

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the...

October 11, 2020 No Comments READ MORE +

What is the most proper answer?

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below: source IP: 192.168.21.100 source port: 80 destination IP: 192.168.10.23 destination port: 63221 What is...

October 11, 2020 No Comments READ MORE +

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Which protocol is used for setting up secure channels between two devices, typically in VPNs?A . PPPB . IPSECC . PEMD . SETView AnswerAnswer: B

October 11, 2020 No Comments READ MORE +

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?A . BluesmackingB . BluesniffingC . BluesnarfingD . BluejackingView AnswerAnswer: D

October 11, 2020 No Comments READ MORE +

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....

October 11, 2020 No Comments READ MORE +

What services by default run on TCP port 123?

You perform a scan of your company’s network and discover that TCP port 123 is open. What services by default run on TCP port 123?A . TelnetB . POP3C . Network Time ProtocolD . DNSView AnswerAnswer: C

October 10, 2020 No Comments READ MORE +

Which of the following is appropriate to analyze?

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly...

October 10, 2020 No Comments READ MORE +