Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?

Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.A . My DoomB . AstacheldrahtC . R-U-Dead-Yet? (RUDY)D . LOICView...

October 14, 2020 No Comments READ MORE +

When tuning security alerts, what is the best approach?

When tuning security alerts, what is the best approach?A . Tune to avoid False positives and False NegativesB . Rise False positives Rise False NegativesC . Decrease the false positivesD . Decrease False negativesView AnswerAnswer: A

October 14, 2020 No Comments READ MORE +

What is the least important information when you analyze a public IP address in a security alert?

What is the least important information when you analyze a public IP address in a security alert?A . ARPB . WhoisC . DNSD . GeolocationView AnswerAnswer: A

October 14, 2020 No Comments READ MORE +

What is the recommended architecture in terms of server placement?

You need to deploy a ned needs to be available on the Internet. What is the recommended architecture in terms of server placement?A . All three servers need to be placed internallyB . A web server facing the Internet, an application server on the internal network, a database server on...

October 14, 2020 No Comments READ MORE +

What kind of attack does the above scenario depict?

You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public...

October 13, 2020 No Comments READ MORE +

What is the name of the process by which you can determine those critical business?

On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service. What is the name of the process by which you can determine those critical business?A . Risk MitigationB . Emergency Plan Response (EPR)C . Disaster...

October 12, 2020 No Comments READ MORE +

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?A . Keyed HashingB . Key StretchingC . SaltingD . Double HashingView AnswerAnswer: C

October 12, 2020 No Comments READ MORE +

Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...

October 12, 2020 No Comments READ MORE +

What is the main security service a cryptographic hash provides?

What is the main security service a cryptographic hash provides?A . Integrity and ease of computationB . Message authentication and collision resistanceC . Integrity and collision resistanceD . Integrity and computational in-feasibilityView AnswerAnswer: D

October 12, 2020 No Comments READ MORE +

From the following table, identify the wrong answer in terms of Range (ft).

From the following table, identify the wrong answer in terms of Range (ft). A . 802.11bB . 802.11gC . 802.16(WiMax)D . 802.11aView AnswerAnswer: D

October 12, 2020 No Comments READ MORE +