What command is used to determine if the entry is present in DNS cache?

DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed. What command is used to determine...

October 19, 2020 No Comments READ MORE +

Which of the below scanning technique will you use?

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?A...

October 19, 2020 No Comments READ MORE +

What is the name of the command used by SMTP to transmit email over TLS?

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is...

October 19, 2020 No Comments READ MORE +

Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds.

Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds. In concept, the solution developed by Bob is...

October 19, 2020 No Comments READ MORE +

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.A . SQL injection attackB . Cross-Site Scripting (XSS)C . LDAP Injection attackD . Cross-Site Request Forgery (CSRF)View AnswerAnswer: B

October 18, 2020 No Comments READ MORE +

What should Bob recommend to deal with such a threat?

Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?A . The use of...

October 18, 2020 No Comments READ MORE +

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?A . Internet Key Exchange (IKE)B . OakleyC . IPsec Policy AgentD . IPsec driverView AnswerAnswer: A

October 18, 2020 No Comments READ MORE +

Which of the below hashing functions are not recommended for use?

Which of the below hashing functions are not recommended for use?A . SHA-1.ECCB . MD5, SHA-1C . SHA-2. SHA-3D . MD5. SHA-5View AnswerAnswer: A

October 18, 2020 No Comments READ MORE +

What is the first thing that Nedved needs to do before contacting the incident response team?

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address. What is the first thing that...

October 18, 2020 No Comments READ MORE +

What is the purpose of a demilitarized zone on a network?

What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...

October 18, 2020 No Comments READ MORE +