Which of the following is the BEST way to defend against network sniffing?
Which of the following is the BEST way to defend against network sniffing?A . Using encryption protocols to secure network communicationsB . Register all machines MAC Address in a Centralized DatabaseC . Use Static IP AddressD . Restrict Physical Access to Server Rooms hosting Critical ServersView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Sniffing_attack...
PGP, SSL, and IKE are all examples of which type of cryptography?
PGP, SSL, and IKE are all examples of which type of cryptography?A . DigestB . Secret KeyC . Public KeyD . Hash AlgorithmView AnswerAnswer: C
What is the most likely cause?
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the...
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 113B . 69C . 123D . 161View AnswerAnswer: C Explanation: https://en.wikipedia.org/wiki/Network_Time_Protocol The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP is...
What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?
What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?A . Session hijackingB...
What is the purpose of a demilitarized zone on a network?
What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning treeB . Dynamic ARP Inspection (DAI)C . Port securityD . Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...
Which of the following best describes this type of system?
Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?A . A biometric system that bases authentication decisions on behavioral attributes.B . A biometric system that bases authentication decisions on physical attributes.C . An authentication system...
What is the name of the command used by SMTP to transmit email over TLS?
Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is...