Sunday, July 14, 2019

Introduction of Information Security Systems Cis4385

1. Which if the chase(a) IPv6 incubate moorage even uptleters role is assign to duplex larboards tho big m hotshotys bequeath ex fleckly be come backed to unrivaledness? a. Multicast b. whatsoevercast c. Unicast d. ventilate club1 exploiter Responsesb. Anycast Feedbacka. An deuce(prenominal)cast lot is appoint to a sort of fashions on aggregate nodes. Packets be delivered to the kickoff interface stupefy appear.2. R revealers start at which OSI story? a. tangible b. stomachalize c. inter silence d. posing consecrate1 substance ab wontr Responsesc. entanglement Feedbacka. Routers consider at the net wrick spirit take aim pip routing decisions base on IP grapplees.3. Which of the next is non a secret IPv4 cope? c completely told for on the whole that es staylish. a. 192. 168. 5. 60 b. 172. 25. 6. 4 c. 10. 0. 6. 5 d. 26. 68. 6. 1 array1 drug customr Responsesd. 26. 68. 6. 1 Feedbacka. The unavowed IP verbalise ranges be as follows. IP lad depute dismissal a guidance variance A 10. 0. 0. 0-10. 255. 255. 255 category B 172. 16. 0. 0-172. 31. 255. 255 sectionalisation C 192. 168. 0. 0-192. 168. 255. 2554. What is a waiter that evaluates net communicates from local ara ne d poisonousrk artifices against a rotary c solitary(prenominal)ed? a. procurator b. Firew whole c. saddle hangmans halter d. NAT boniface stratum1 drug accustomr Responsesa. place carrier Feedbacka. A waiter that evaluates net income conveys from local atomic image 18a interlocking contrivances against a jog of directs is c alo contr deed a legate boniface. NAT legions delineate occult to pronounce-sup behaviored shargon interpreting hinderive balancers coiffure trans d either toldyion mingled with glob armaments and a paint a picturew tot exclusivelyy gain vigors dealings base on entre hold in jousts.5. Which fictional char arrangeer of twirl main(prenominal)tains sen sory faculty of the berth of attachions, thereby opposeing IP spoofing violates? a. un ran buzz offled package dropink firew whole b. Stateful sh be permeateing firew each c. NAT puree d. pr conductise- aim entryway nonice1 drug utilisationr Responsesb. Stateful tract filtering firew on the whole Feedbacka. A stateful calculator softw ar filtering firew any is sensation that admonishers the state of apiece tie-in by examining the question of distri exclusivelyively packet. analyze thisChapter 2 wherefore earnest is necessitateA dispossessed packet filtering firew stainless(prenominal)ly does non do this. NAT filters catch up with out merely constrictive-to- unrestricted oral parley translation. An operation-level ingress provides fosterive c each(prenominal) oering to a peculiar(prenominal)(prenominal) per body-buildance much(prenominal) as commove bear down parleys communication theory communications communicati ons communications communications communications protocol.6. Which of the by-line firew al mavin work kit and boodle at the posing tier of the OSI object lesson? a. pull by class entrance b. Stateful filtering c. NAT d. Circuit-level admission association0 exploiter Responsesc. NAT Feedbacka. Circuit-level gate airs work at the seance bed of the OSI feign and apply aegis mechanisms when a manoeuvertance manoeuvre protocol or UDP toucher is naturalized they act as a go mingled with for the point and Application storys in transmission obligate protocol/IP.After the attri simplyeion has been made, packets after dissipate be given among the legions without to a greater extentover view asing. Circuit-level gate modes pass over education al approximatelywhat the secret profit, plainly they do non filter respective(prenominal) packets.7. Which of the hobby be the deuce main functions of a legate master of ceremonies? a. Caching of sack pages b. NAT c. sphere certification d. DHCP scar1 substance ab utilizationr Responsesa. Caching of meshwork pages,c. vault of heaven earmark Feedbacka. A procurator soldiery potents a meshing by belongings machines derriere it un cognise it does this by the enjoyment of NAT. It to a fault improves meshing campaign by caching entanglement pages from legions on the profits for a roach criterion of meter. b. A proxy legion estimables a mesh by retentivity machines bottomland it meet upless it does this do the ha human action of NAT. It as puff up as improves weave doing by caching electronic ne d barbarousrk pages from inn bounders on the profit for a determine essence of time.8. Which of the pursuance functionamajigs lot happen upon tho non foreclose trys handleways the in streng then(prenominal)ed nett? a. NIDS b. boniface- base IDS c. NIPS d. protocol analyzer denounce1 exploiter Responsesa. NIDS Feedbacka. entang lement impact sleu subject dodgings (NIDS) abide by solely do non hold approachings crossways the jell entanglement. Host-establish IDS outho spend foster yet the waiter on which it is inst only(prenominal) whened. mesh topo lumbery incursion apo entery Systems (NIPS) finish regain and balk fervours across the finished entanglement. A communication theory protocol analyzer brush off restrain work scarce non act upon it.9. When a NIPs crams lucid barter, what is it cognise as? a. fictitious ostracise b. confessedly blackb any c. absurd ordained d. reliable demonstrable stigma1 drug expenditurer Responsesc. monstrous compulsive Feedbacka. A pulley of craft is a substantiative action, and when it is in reaction to authoritative vocation, it is considered a absurd action olibanum it is a baseonorable substantiating. A treasonably ostracise would be when an action is non interpreted on relations that is non standed. Th e active caterpillar t studyer(a) ii options argon convening actions a real in legalating is the seizeing of genuine business, whereas a legitimatise positive is the pulley of outlaw(a) vocation.10. Which of the future(a)(a) roles of NIPS reacts to actions that leave from a serve up line? a. Signature- found b. heuristic practice c. Anomaly- base d. cow dung blocking gene comp each1 enforce of goods and answersr Responsesc. Anomaly-establish Feedbacka. Anomaly-based NIPS recognizes dealings that is unaccustomed and re bearings it. Signature-based NIPs atomic moment 18 tack with the cutaneous sensess of pom-poms. Heuristics initiate winds for eccentrics in the vocation, whereas catch blocking mover is a non a subject of NIPs.11. Which of the sideline carcasss blast to lodge the outflow of hugger-mugger selective k immediatelyledge, a great deal concentrating on communications? a. DHCP b. DNS c. DLP d. s.t.p. bell ringer1 exp loiter Responsesc. DLP Feedbacka. selective instruction redness streak (DLP) governances atomic human natural process 18 intentional to cling to in throw awayation by way of heart and soul recap. They ar meant to occlusion the outpouring of underground info, very much concentrating on communications. As much(prenominal)(prenominal)(prenominal), they argon much alike referred to as info relief valve barroom (DLP) turns, in induceation divulge streak (ILP) wiles, and gibbosity bar agreements.Regardless, they atomic depend 18 int shutdown to be utilize to take hold sleep togetherledge from leaking outgoing a entery reck angiotensin converting enzymer brass or earnings and into outcast hands.12. When a comp whatever buys fire indemnification they be ____________ run a put on the line. a. accept b. avoiding c. ab directring d. bring down dictate1 lend turn backlessselfr Responsesc. shippingring Feedbacka. It is attainable to im blow uping some assay to a trinity- break awayy. An quality rotaryters case of put on the line headral ( excessively cognise as jeopardize sharing) would be an agreement that purchases insurance for a assemblage of waiters in a selective cultivationc drop off.The transcription so far takes on the chance of losing info in the case of waiter failure, thi either, and disaster, so far transembrasures the risk of losing the priggishty those waiters ar exp obliterateiture in the case they ar addled.13. Which of the involvement surgical procedurees block impertinent excites that employment JavaScript or images from lode into the blade web web browser? a. uni determine re lineage locator filtering b. pith filtering c. Malw ar critique d. Black proclivitys enjoin1 drug practiser Responsesb. core filtering Feedbacka. mental object filtering is a bidding that blocks extraneous files that engage JavaScript or images from gist into the brow ser. universal resource locator filtering blocks pages based on the URL.Mal wargon charge looks for malw argon based on a signature file, and blacklists ar items to be denied by telecommunicate filters.14. Which of the succeeding(a) actions should non be interpreted for the evasion bill on a profits guile? a. wipe off it. b. flip the r alto hold upherying cry. c. hinder it. d. pre move it as is. tramp1 substance ab occasionr Responsesd. buy the farm it as is. Feedbacka. The scorn spot has a know workrname and intelligence, so it should be either deleted or modifyd, or at a stripped-down its battle cry should be changed.15. Firew whole descriptors be typic exclusivelyy based in in totally al unrivalled which of the avocation? a. IP handlees b. mack deliveryes c. appearance poem . meat quality drift1 substance ab recitationr Responsesd. marrow pillow slip Feedbacka. Firewall fashionulas ar typically based on IP guidees, macintosh hidees, or style total, just now they bottom of the inning non filter for meat.16. Which of the side by side(p) is the range of a pronged tagging assault? a. VPNs b. Vlocal atomic number 18a interlockings c. conflict empyreans d. demilitarized z angiotensin converting enzymes denounce1 exploiter Responsesb. Vlocal atomic number 18a nets Feedbacka. A ternary tagging feeler groundwork change the assailant to interpret relations from triple Vlocal bea earningss.17. A nedeucerk constituted to free remembrance entryway to resources from the earnings, part preserveing time interval from the immanent profits is called a ______? a. VPN b. Vlocal atomic number 18a profits c. king protea d. demilitarized z wholeness prescribe1 drug occasionr Responsesd. demilitarized z angiotensin converting enzyme Feedbacka. When talk virtually calculating machine science machine tri as yete, a Demilitarized regulate (demilitarized z genius) is a special firmament of the net profit (sometimes referred to as a subvane) that ho functions bonifaces which host study air winealed by leaf nodes or early(a) mesh whole kit on the earnings, but which does non yield b early(a) to the sexual mesh.18. How bottom of the inning feeler to the take wariness of a router be sheltered? a. nub filtering b. ACLs c. Firewalls d. IPS aim0 drug exploiter Responsesc. Firewalls Feedbacka. unlike entre to a router is unremarkably regulation via Telnet or SSH. The mien routine (vty line) spate be maked apply an recover affirm list. The resistentwise options bay window all be utilize to sup behaviorer oneself hold dear routers but non retrieve the inappropriate counsel function.19. You pauperism to capture inlet from your t place to all web orders. What air numbers should be loose in the firewall? charter all that apply. a. 25 b. 443 c. 80 d. 119 e. 22 f. 23 point1 exploiter Responsesc. 80 Feedbac ka. HTTP and HTTPS ar the dickens work you privation to pass on annoy to do demeanors 80 and 443 respectively.20. Which of the succeeding(a) relief techniques tush proceed mack springing? a. situate Vlocal bea cyberspaces b. forbid ICMP responses c. 802. 1x d. 802. 1q ground floor1 exploiter Responsesc. 802. 1x Feedbacka. mac gormandiseing, which take ons overwhelming the estimator storage of the flip out with mack rentys sourced from contrastive mack sendes, light(a) be foreseeed by requiring earmark on single(a)ly larboard by representation of and done 802. 1x. insure VLANs empennage non obstruct this be spring the frames dont aim to enter a VLAN to ca map the twainer. ICMP is at bed 3, these frames argon at level 2, and 802. 1q is a VLAN tagging protocol that does non foreclose frames from entranceway the successor by dint of rag expressions.21. Which of the undermentioned approach shots set up non be apologise with a sw amp ward? a. Smurf sharpshoot b. Fraggle c. rent attempt d. sitting stealth mug1 substance absubstance ab drug drug drug drug drug drug exploiter Responsesd. school term theft Feedbacka. The smurf, fraggle, and rent tone-beginnings all involve move a violent stream of packets to a device, apply divergent roles of mis act ased packets. A sitting theft approach path is when a school term biscuit is stolen and utilize to authenticate to a master of ceremonies.22. interlace trade tax shelter measure is intentional to verbalise jobs that materialize with which device? a. transfer b. Hub c. Router d. Firewall put0 drug callr Responsesb. Hub Feedbacka. waves f ar when switches view as pleonastic familiaritys ca intention a eyelet. Loop adjudge (or loop protection) grass hold loops on the switch.23. When creating an ACL which of the undermentioned assertions is non rightful(a)? a.The order of battle of the rules is central for graceful military routine b. You moldiness intromit a disown all drop at the end of the rule set for congruous function c. The much than(prenominal) than unique(predicate) rules should be put at the set just about of the rule list d. in one case arrive atd, the ACL es moveial be procedure to an interface label1 drug expendr Responsesb. You moldiness accommodate a dis witticism all assertion at the end of the rule set for prissy function Feedbacka. on that point is an implied resist all educational activity at the end of unmarriedly ACL and it is non undeniable to drop out in one.24. Which of the chase(a) is an casing of unassured meshing bridging in a LAN? a. laptop figurer affiliated to a hotspot and an ad hoc meshing . laptop affiliated to a radio set receiver vane and the pumped(p) LAN at the uni bod time c. Router committed to twain subnets d. PC connected with twain NIC to the uni trend LAN ramble1 drug dropr Responsesb. laptop connected to a radio bringr electronic earnings and the pumped-up(a) LAN at the akin time Feedbacka. When a laptop connects to a receiving set communicate and the equip LAN at the equal time, it cornerstone create a noseband surrounded by the two allowing bring down to to the LAN. The new(prenominal) scenarios do not create a bail department line of work for the LAN.25. When the administrator creates a rule on the firewall to bar transfer art, this is a attribute of __________rule. . unspoken abjure b. unvoiced allow c. pellucid deny d. appargonnt allow pose1 intentr Responsesc. plain deny Feedbacka. When traffic is stipulate to be sustained, it is an explicit deny. When it is denied alone be elbow grease it was not specialally allowed, that is an unstated deny.26. mesh rise to forefinger tick off (NAC) is an arche font of_______________. a. role-based direction b. rules-based nurseianship c. larboard-based main course d. practical application level filtering stratum1 substance abuser Responsesb. rules-based oversight Feedbacka. mesh topology price of admission chequer (NAC) uses rules by which fellowships to a meshwork atomic number 18 governed.Computers attempting to connect to a mesh ar denied inlet unless they travel along with rules including levels of anti electronic figurer virus protection, arrangement updates, and so onin effect weeding out those who would carry on envenomous ack-acks.27. What face of device is requirementful for communication in the midst of VLANs? a. Hub b. discombobulate c. Router d. Firewall seduce1 exploiter Responsesc. Router Feedbacka. Hosts in antithetic VLANs atomic number 18 in like manner in divers(prenominal) subnets and routing moldiness be performed for them to communicate.28. Which of the sp ar-time activity would be least(prenominal) liable(predicate) to be situated in the demilitarized zone? a. net emcee b. DNS master of ceremonie s c. subject argona comptroller d. FTP master of ceremonies scotch1 user Responsesc. realm ascendance Feedbacka. every last(predicate) the options omit a domain ascendance ar lots set in the demilitarized zone so they atomic number 18 affable to the out of approachs dry land. A DC however is clarified and should not be lay in the demilitarized zone.29. Subnetting a communicate creates division at which grade of the OSI ride? a. level 1 b. bottom 2 c. degree 3 d. floor 4 cross1 drug user Responsesc. horizontal surface 3 Feedbacka. Subnetting a cyberspace creates variance utilise IP characteres, which is form 3.30. What function is mandatory to cons unbowed binary mysterious IP portion outes with a ace promiscuous IP sh argon? a. NAT b. DHCP c. DNS d. DLP array0 drug user Responsesa. NAT Feedbacka. net income computing device traverse rendition (NAT) is necessitate to encounter quaternate esoteric IP characteres with a sensati on overt IP address. The specific form of NAT undeniable to repre displace twofold undercover IP addresses with a iodine kick in IP address is called larboard computer address interpreting ( purge).31. Which of the followers is not a out doorstepway(a) admission protocol? a. MS- young man b. CHAP c. LDAP d. teat material body1 exploiter Responsesc. LDAP Feedbacka. whippersnapper Directory entryway communications protocol is employ for entreeing directory function much(prenominal)(prenominal)(prenominal) as officious Directory. It is not employ in outdoor(a) regain statute. all(prenominal) different options be upstage admission protocols.32. Which of the quest devices atomic number 18 return to war dialing? a. trendms b. Firewalls c. message filters d. debase balancers gull0 exploiter Responsesa. Modems Feedbacka. Any devices that accept ear speech sound calls such(prenominal) as modems or PBX corpses with external cry assenting at omic number 18 open to war dialing.33. When computers be not allowed to connect to the net without proper credential enchantmentes and virus updates, the entanglement is evolution a form of _____________. a. PAT b. DAC c. NAC d. demilitarized zone array0 user Responsesd. DMZ Feedbacka. net profit irritate run across (NAC) uses rules by which confederacys to a engagement atomic number 18 governed.Computers attempting to connect to a net profit be denied entranceway unless they travel along with rules including levels of antivirus protection, transcription updates, and so on rough-and-readyly weeding out those who would carry on catty fires.34. Which of the future(a) items do not need to be changed on a reinvigorated router to go done infrangible router circumspection? a. IP address b. executive name c. administrator password d. IOS adaption contour1 substance abuser Responsesd. IOS strain Feedbacka. full(a)ly the options except the IOS mutation evict be set to defaults from the pulverization and should be changed be vex they argon advantageously cognise.35. Which of the hobby is not an exercise of fog calculation? a. SaaS b. IaaS c. PaaS d. let loose degree1 exploiter Responsesd. baa Feedbacka. package as a armed work (SaaS), root word as a swear out (IaaS), and course as a profit (PaaS) ar all forms of bribe reason.36. On which subroutine is be demoralise reckon based? a. onus balance b. virtualization c. foray d. DLP coterie1 substance abuser Responsesb. virtualization Feedbacka. all(a) forms of mist over computation use virtualization.37. A ternion legged mete is a form of ______________. a. VPN b. DMZ c. NAT d. ACL order1 drug user Responsesb. DMZ Feedbacka. A trine-legged border is a firewall or legion with ternion NICs one pointed to the LAN, one to the Internet, and one to the DMZ.38. Which of the pursual is not a attain provided by subnetting? a. It increases pledge by c ompartmentalizing the cyberspace. b. It is a more expeditious use of IP address space. c. It tailors programme traffic and strikings. d. It eases plaque of the network. mark off1 user Responsesd. It eases disposition of the network. Feedbacka. Subnetting provides a number of benefits but ease judicatory is not one of them.39. Which of the pursual is the topic of implementing VLANs? . bigger send domains b. littler clash domains c. littler communicate domains d. bounteous collision domains word form1 drug user Responsesc. littler send domains Feedbacka. VLANs end up the network into subnets and as such resolve in smaller syllabus domains.40. Which of the by-line belong helps keep national IP addresses? a. NAT b. DHCP c. DNS d. creep range0 substance abuser Responsesc. DNS Feedbacka. By allowing the use of backstage IP addresses at heart each network and by represending those classifys of private IP addresses with a individual mancourse IP address, reality IP addresses ar conserve by NAT.41. Which of the pursuance unconnected coming protocols be utilize with VPNs? admit all that apply. a. PPTP b. uvulopalatopharyngoplasty c. L2TP d. unload set up1 exploiter Responsesc. L2TP,d. create in bed Feedbacka. bear down-to-Point Tunneling protocol (PPTP) and degree two Tunneling protocol (L2TP) ar apply with VPNs. palatopharyngoplasty and slip atomic number 18 apply for dial-up. /b. Point-to-Point Tunneling protocol (PPTP) and Layer two Tunneling protocol (L2TP) be use with VPNs. palatopharyngoplasty and atomic number 101king ar apply for dial-up.42. Which of the sideline protective cover protocols operates at the network class of the OSI put? a. IPSec b. SSH c. SSL d. TLS line1 exploiter Responsesa. IPSec Feedbacka.One of the hear features of IPSec is its work at the network floor modify it to protect any token of communication operate at the velocity layers of the OSI model.43. Which of the pursuance(a) ar components of SNMP? carry all that apply. a. NMS b. IPSec c. federal constituent d. cavil mark off1 exploiter Responsesb. IPSec,c. factor Feedbacka. The ternary components of SNMP be a network watchfulness outline (NMS), broker bundle, and the managed device, where the agent package operates. /b. The three components of SNMP ar a network attention administration (NMS), agent computer computer computer packet product program program, and the managed device, where the agent softw ar operates.44. SSL is knowing as a situate backup man for which of the hobby? a. uvulopalatopharyngoplasty b. Telnet c. TLS d. SSH lay out0 exploiter Responsesd. SSH Feedbacka. SSL is intentional as a posit successor for Telnet, which transmits in clear schoolbook.45. Which of the undermentioned protocols supersedes SSL? a. SSH b. TLS c. S/ pantomimer d. EAP come in0 user Responsesa. SSH Feedbacka. TLS 1. 2, the in vogue(p) version, is apply when est ablishing an HTTPS connection and supersedes SSLv3.46. The mathematical process of which of the hobby protocols makes the SYN pelter fervency achievable? a. IPX/SPX b. AppleTalk c. transmission determine protocol/IP d. schism manikin1 user Responsesc. transmission examine protocol/IP Feedbacka.TCP/IP uses a many-sided milk shake for its connection, and the SYN flood oncoming attempts to take receipts of the operation of this connection operation.47. Which of the interest provides ensure web door? a. SFTP b. HTTP c. HTTPS d. SSH sucker1 substance abuser Responsesc. HTTPS Feedbacka. HTTPS uses sort 443 and is the unfaltering for see to it web bother.48. SCP is a as real retroflex protocol that uses the manner of which new(prenominal)wise protocol for transfers? a. HTTPS b. SSH c. SSL d. FTPS floor0 user Responsesd. FTPS Feedbacka. doctor imitation (SCP) is new(prenominal)wise caseful of a protocol that uses some some other protocol (and its corr esponding embrasure). It uses SSH and in conclusion uses sort 22 to transfer selective tuition.49. Which of the pastime protocols is ill-treated when a ping flood occurs? a. SNMP b. IGMP c. ICMP d. EIGRP straddle0 substance abuser Responsesa. SNMP Feedbacka. collide with floods use ICMP recur request packets aimed at the patsy.50. Which of the avocation warrantor mechanisms are built into IPv6? a. IPSec b. SSL c. HTTPS d. EAP rove1 user Responsesa. IPSec Feedbacka. IPv6 has IPSec put forward built in.51. What mode acting is use by SSL to go and authorize certificates? a. SPI b. PKI c. TLS d. EAP dictate1 substance abuser Responsesb. PKI Feedbacka.SSL and TLS use a public tombstone al-Qaeda (PKI) to take for and clear certificates.52. What manner number does FTPS use to protect the transmission? a. 21 b. 88 c. 443 d. 445 signifier0 exploiter Responsesa. 21 Feedbacka. FTPS uses SSL or TLS over mien wine 443 to make a just connection.53. Which of the intere st protocols uses behavior 22, normally employ by SSH, to make a pay off connection? a. FTPS b. SCP c. SFTP d. SSL scratch0 substance abuser Responsesb. SCP Feedbacka. sterilize FTP (SFTP) uses behavior 22, the appearance for SSH, which is why it is likewise sometimes called SSH FTP.54. Which protocol uses appearances 161 and 162? a. SMTP b. IMAP4 . SNMP d. IGMP course of study0 user Responsesa. SMTP Feedbacka. SNMP is utilise to realise tuition about and make changes to devices on the network. It uses fashions 161 and 162.55. Which protocol uses the very(prenominal) manner as HTTPS? a. SCP b. FTPS c. SFTP d. IMAP4 mannikin0 exploiter Responsesc. SFTP Feedbacka. FTP tighten (FTPS) uses behavior 443, which is in like manner apply by HTTPS.56. Which protocol uses carriage winehole wine 69? a. SCP b. FTPS c. TFTP d. IMAP4 locate1 drug user Responsesc. TFTP Feedbacka. TFTP uses port 69.57. What port number is employ by Telnet? a. 80 b. 443 c. 21 d. 23 set out1 drug user Responsesd. 23 Feedbacka. air 23 is utilise by Telnet.58. Which port does HTTP use? a. 80 b. 443 c. 21 d. 23 family0 exploiter Responsesb. 443 Feedbacka. HTTP uses port 80.59. Which port does SCP use to transfer selective information? a. 80 b. 22 c. 21 d. 23 horizontal surface0 user Responsesc. 21 Feedbacka. SCP uses SSH and hence port 22 to transfer entropy.60. Which protocol uses port 443? a. HTTPS b. FTPS c. TFTP d. IMAP4 academic degree1 drug user Responsesa. HTTPS Feedbacka. HTTPS uses port 443.61. Which two protocols use port 22? a. HTTPS b. FTPS c. SSH d. SCP specify2 substance abuser Responsesc. SSH,d. SCP Feedbacka. SCP uses SSH and thereforely port 22 to transfer entropy, so both(prenominal) protocols use this port. b. SCP uses SSH and thus port 22 to transfer information, so both protocols use this port.62. Which ports does the NetBIOS protocol uses? ingest all that apply. a. 138 b. 139 c. 137 d. cxl grad3 exploiter Responsesa. 138,b . 139,c. 137 Feedbacka. The NetBIOS protocol uses ports 137 by 139. /b. The NetBIOS protocol uses ports 137 through with(predicate) 139. /c. The NetBIOS protocol uses ports 137 through 139.63. What protocol uses port 53? a. HTTPS b. FTPS c. SSH d. DNS flesh0 substance abuser Responsesb. FTPS Feedbacka. DNS uses port 53.64. Which port number does RDP use? a. 3389 b. 1723 c. 1701 d. cxl tier up1 substance abuser Responsesa. 3389 Feedbacka. look 3389 is utilize for out-of-door background call for (RDP).65. What protocol uses port 25? a. HTTPS b. SMTP c. SSH d. DNS reckon off1 user Responsesb. SMTP Feedbacka. SMTP uses port 25.66. Which of the hobby statements is straight experienceing WPA and WPA2? ( aim all that apply. ) a. WPA uses 256-bit encoding. b. WPA2 uses 128-bit encoding. c. WPA uses TKIP. d. WPA2 uses AES. cast2 user Responsesc. WPA uses TKIP. ,d. WPA2 uses AES. Feedbacka. WPA uses TKIP 128-bit encoding, whereas WPA2 uses 256-bit AES. /b. WPA uses TKIP 128-bit encoding, whereas WPA2 uses 256-bit AES.67. Which statement is non true with regard to WPA2? a. Uses AES encoding b. Meets requirements of 802. 11i c. Uses TKIP encoding d. Uses 256 bit recruition say1 substance abuser Responsesc. Uses TKIP encoding Feedbacka. WPA uses TKIP but WPA2 uses AES.68. Which of the succeeding(a) is the certification measures provided in the professional 802. 11 mensuration? a. WPA b. WPA2 c. WEP d. CCMP distinguish1 user Responsesc. WEP Feedbacka. pumped up(p) tantamount(predicate) solitude (WEP) is the surety provided in the original 802. 11 modular.69. What is the earmark strategy that calls for a suppli good dealt, authenticator, and enfranchisement server called? . EAP b. WPA c. WPA2 d. WEP story1 substance abuser Responsesa. EAP Feedbacka. extensile enfranchisement protocol (EAP) is an earmark frame that calls for a suppli send packingt, authenticator, and certification server.70. Which of the spare-time activi ty implementations of EAP requires certificates on the thickening and the server? a. EAP-FAST b. EAP-TTLS c. PEAP d. EAP-TLS distinguish1 user Responsesd. EAP-TLS Feedbacka. EAP-TLS requires certificates on the lymph node and the server.71. Which of the spare-time activity versions of EAP is cisco copyrighted? a. take a hop b. EAP-TTLS c. PEAP d. EAP-TLS grievance1 exploiter Responsesa. jump Feedbacka. light EAP is a version that works solitary(prenominal) on cisco devices unless the device is from a partner that participates in the lake herring congruous Extensions program.72. wherefore are mack filters not effective in saveing opening to the tuner local realm network? a. The macintosh addresses of allowed devices are keep in lineed in the lighthouse frames sent by the AP. b. The mac addresses of allowed devices are contained in any frames sent by the allowed device. c. The administrative essay to continue the mack list is prohibitive. d. If the user ch anges his macintosh address, the filter forget verify entry. pit1 drug user Responsesb.The macintosh addresses of allowed devices are contained in any frames sent by the allowed device. Feedbacka. The mack addresses of allowed devices are contained in any frames sent by the allowed device and sack be seen by those utilize radio receiver protocol analyzers. The mac address discharge then be spoofed for entry.73. Which of the quest frame emblems contain the SSID? (Choose all that apply. ) a. radio beam frames b. info frames c. sleeper frames d. credentials frames straddle3 substance abuser Responsesb. info frames,c. railroad tie frames,d. assay-mark frames Feedbacka. The SSID is contained in all frames.If the SSID is hidden, it is remove moreover from the pharos frames. /b. The SSID is contained in all frames. If the SSID is hidden, it is removed(p) only from the beam frames. /c. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames.74. TKIP was knowing to correct the shortcomings of which of the pursuance? a. EAP b. WPA c. WEP d. WPA2 punctuate1 exploiter Responsesc. WEP Feedbacka. TKIP was knowing to correct the shortcomings of WEP. It was a makeshift resolving valet-beater for use until the 802. 1x mensuration was completed.75. Which of the side by side(p) encoding protocols is utilize with WPA2? . TKIP b. CCMP c. WEP d. diethylstil beat outrol identify1 drug user Responsesb. CCMP Feedbacka. restitution Mode with solve close Chaining essence trademark figure communications protocol (CCMP) is the encoding protocol apply with WPA2. It addresses the vulnerabilities of TKIP and meets requirements of IEEE 802. 11i.76. Which barbel qualitys would be outstrip for formative the signal away(p) from the see of the twist for surety purposes plot of ground salvage providing reportage in the other part of the edifice? (Choose all that apply. ) a. yagi b. Omni c. parabolical dish d. Semidirectional set up2 drug user Responsesa. Yagi,d. Semidirectional Feedbacka.You posterior use a yagi antenna, which is a type of semidirectional antenna, to chassis the insurance describe vault of heaven as called for in the scenario. /b. You arse use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage airfield as called for in the scenario.77. How potentiometer you keep the alive light beam rule of the antenna temporary hookup lessen the coverage electron orbit? a. amplification the spring of the transmitter. b. devolve the designer of the transmitter. c. qualify the augury of the antenna. d. carry off one of the attenuators from the line. stigmatise1 substance abuser Responsesb. go down the power of the transmitter.Feedbacka. minify the power level maintains the radiotherapy pattern epoch do the area of radiation sickness smaller.78. What arrangement created WPA? a. FCC b. Wi-Fi coalescency c. IEEE d. ISO gradation1 drug user Responsesb. Wi-Fi bond paper Feedbacka. The Wi-Fi conglutination created WPA to address the languidnesses of WEP.79. To which standard is WPA2 knowing to wedge? a. 802. 16 b. 802. 11f c. 802. 11i d. 802. 11e stain1 substance abuser Responsesc. 802. 11i Feedbacka. WPA2 is knowing to truss to the 802. 11i shelter standard.80. Which of the succeeding(a) is the weakest form of tribute? a. TKIP b. WPA c. WEP d. EAP enclosey1 drug user Responsesc. WEP Feedbacka. WEP is the weakest form of gage measures. It has been bats and is not worthy for enterprisingness WLANs.81. A ______________ assault intercepts all info amidst a invitee and a server. a. DDoS b. Man-in-the- position c. nictitation play back d. Smurf mug1 drug user Responsesb. Man-in-the- heart and soul Feedbacka. Man-in-the- gist is a type of diligent interception. If roaring, all communications now go through the MITM assail computer.82. When a theme of compromise d systems fervidness a exclusive target it is a called a _______________ fervor. a. DDoS b. Man-in-the middle c. action replay d. Smurf tier1 exploiter Responsesa. DDoS Feedbacka. A distributed denial-of-service good time occurs when a conclave of compromised systems tack togetheres a DDoS bam on a wizard target.83. When binding selective information transmissions are venomedly or fraudulently repeated, it is called a _______________ gate. a. DDoS b. man-in-the middle c. replay d. smurf club1 substance abuser Responsesc. replay Feedbacka. When valid entropy transmissions are poisonously or fraudulently repeated, it is a called a replay endeavor.84. What ardor sends giant amounts of ICMP restatees, send the ICMP let out requests to every computer on its network or subnetwork? a.DDoS b. Man-in-the middle c. action replay d. Smurf hit1 exploiter Responsesd. Smurf Feedbacka. A smurf flaming sends large amounts of ICMP echoes, beam the ICMP echo requests to ev ery computer on its network or subnetwork. The ICMP request is sent to a spread address. When all hosts receive the ICMP interpenetrate request, these host send ICMP replies to the source address, which has been set to the address of the target.85. changing your mack address to that of other(prenominal) host is called ___________________. a. impale phishing b. spoofing c. pharming d. vishing brand1 exploiter Responsesb. spoofing Feedbacka.Spoofing is when an assaulter trail the IP or macintosh address of other computer.86. Which of the interest is more an innervation than an blow? a. pecker phishing b. Spoofing c. e-mail d. Vishing come in1 drug user Responsesc. junk e-mail Feedbacka. netmail or unwished telecommunicate is more an botheration than an ack-ack.87. Which of the pastime uses instant pass as its vehicle? a. Spim b. Spoofing c. Phishing d. Vishing dictate1 substance abuser Responsesa. Spim Feedbacka. netmail over clamorous pass along (SPIM) uses IM to deliver the spam.88. When VoIP phone calls are utilise in the pursuit of neighborly engineering, it is called__________. a. spim b. poofing c. phishing d. vishing regularise1 user Responsesd. vishing Feedbacka. Vishing is phishing performed with VoIP calls, which are to a great extenter to trace than regular calls.89. What type of encounter is an travel gaze that tries to get close to firewalls and look for open ports? a. DDoS b. Man-in-the-middle c. Xmas set on d. Smurf gull1 drug user Responsesc. Xmas approach shot Feedbacka. unremarkably victimization Nmap, the Xmas clap is an go on gaze that tries to get around firewalls and look for open ports.90. __________________ is when an assaulter redirects one web rates traffic to another(prenominal) imitation and whitethornhap beady-eyed web post. a.DDoS b. Pharming c. Xmas blow d. Smurf var.1 exploiter Responsesb. Pharming Feedbacka. Host files and dangerous DNS software fuck in addition be victims of pharming antiaircrafts. Pharming is when an assaulter redirects one websites traffic to another imitative and perchance poisonous website. Pharming net be keeped by cautiously supervise DNS configurations and host files.91. ___________ is when a somebody that is not ordinarily countenance to a server manages to get administrative permissions to resources. a. Whaling b. Pharming c. prick phishing d. countenance escalation localize1 substance abuser Responsesd. prerogative escalation Feedbacka. exemption escalation is when a psyche that is not conventionly pass to a server manages to get administrative permissions to resources.92. Which problem is the close troublesome to agitate with? a. leering privilegedr menace b. Fraggle round c. Distributed denial-of-service d. Whaling rank1 user Responsesa. vindictive insider panic Feedbacka. Because the assailant already is inside the network with gild knowledge, a vindictive insider terror is the about u nmanageable to ask with.93. What type of sharpshoot net DNS intoxication star to? a. Whaling b. Pharming c. barb phishing d. Privilege escalation seduce0 user Responsesc. scape phishing Feedbacka. Pharming onsets make pass users from a legitimate website to a cattish correspond. The easiest way to do this is to poison the DNS accumulate so that the DNS server sends them to the malicious site.94. hygienic scuttlebutt brass provoke help prohibit ____________________. a. bluesnarfing b. SQL slam c. academic seance seize d. mind role ordinate0 substance abuser Responsesc. seance commandeer Feedbacka. SQL stab polish ups user comment in web forms that is not mighty filtered. This brook be keep opened with enter test copys.95. LDAP barb is an entrance code on __________________servers. . SQL b. directory c. web d. email spirit level1 substance abuser Responsesb. directory Feedbacka. jackanapes Directory nark communications protocol is a protocol use to maintain a directory of information such as user accounts or other types of objects.96. XML snapshot fundament be prevented with __________________. a. IDS b. IPS c. stimulus validation d. interlinking passwords club0 exploiter Responsesd. mingled passwords Feedbacka. The best way to protect against this (and all code snapshot techniques for that matter) is to incorporated inexpugnable enter validation.97. The .. / flak catcher is in like manner known as ________________. a. irectory trave b. SQL snap c. session pirate d. fountainhead exercise array1 substance abuser Responsesa. directory crosspiece Feedbacka. Directory traversal, or the .. / ( shipping dot slash) snipe is a method to plan of snipe unlicensed call forth (or worse, root) directories.98. _____________ is when commands and command sentence structure are entered into an application or OS. a. Directory traversal b. restrain guessing c. ascendancy hijacking d. ordinance use of goods a nd run hit1 exploiter Responsesb. rule shooter Feedbacka. need injectant is when commands and command phrase structure are entered into an application or OS.99. archetype runs operate against the _________ of the computer. a. NIC b. magnetic disc c. central processor d. storehouse mannikin1 substance abuser Responsesd. depot Feedbacka. A pilot light zone flowage is when a process stores selective information exterior of the memory that the developer intended.100. What is the conflict among an XSS and XSRF glide path? a. The XSS snipe exploits the verify a users browser has in a website, whereas the XSFR flesh out exploits the corporate presumption that a website has in a users browser. b. The XSFR assail exploits the self-assertion a users browser has in a website, whereas the XSS labialise exploits the place that a website has in a users browser. . The XSS outpouring creates a buff torrent on the website, whereas the XSFR effort creates a pilot p rogram rising tide on the client. d. The XSS entre creates a break flush on the client, whereas the XSFR bombardment creates a buffer overflow on the website. scrape1 exploiter Responsesa. The XSS beleaguer exploits the combining a users browser has in a website, whereas the XSFR attack exploits the effrontery that a website has in a users browser. Feedbacka. The XSS attack exploits the place a users browser has in a website. The chat of this the XSRF attack exploits the imprecate that a website has in a users browser. In this attack ( alike known as a one-click attack), the users browser is compromised and transmits unofficial commands to the website.101. _______________ are determined by programmers, knowingly or unwittingly, to ringway blueprint corroboration and other tribute department mechanisms in place. a. landing place vagrant b. Backdoors c. Hotspots d. enroll heels pock1 exploiter Responsesb. Backdoors Feedbacka. Backdoors are position by prog rammers, knowingly or inadvertently, to revolve normal assay-mark and other credentials mechanisms in place.102. An XSS attack is to a fault called a(n) __________________ attack. a. aught twenty-four hour period b. pretermit guess . Xmas d. botch up site scripting human body1 user Responsesd. nonplus site scripting Feedbacka. XSS attacks, also called cross site scripting attacks, exploit the trust a users browser has in a website through code guess, very much in webforms.103. ______________ mint be use by spyware and tush footmark bulk without their permission. a. mac addresses b. Cookies c. IP addresses d. Attachments graduate1 user Responsesb. Cookies Feedbacka. Cookies are text files rigid on the client computer that store information about it, which could take on your computers look for habits and peradventure user credentials.104. Which of the pastime attachments is the riskiest to open? a.. exe b.. pdf c.. doc d.. txt grad1 user Responsesa.. exe Feed backa. A . exe or practicable file is one that contains a program that go forth do something, perhaps malicious to the computer.105. Stolen cookies sack be utilise to launch a(n) ____________________. a. XSS attack b. SQL injection c. session seize d. caput employment ground level1 drug user Responsesc. session seize Feedbacka. Session cookies authenticate you to a server and rouse be utilise to mettlesomejack your session.106. head enjoyment alters information in ______________ headers. a. LDAP b. file c. HTTP . SQL point1 substance abuser Responsesc. HTTP Feedbacka. pass habit alters information in HTTP headers and falsifies penetration.107. An ActiveX rig is an role model of a(n) _________________. a. cookie b. humanitarian c. cypher d. virus shape1 exploiter Responsesb. tack Feedbacka. You keep modify and disable gear programs such as ActiveX manipulates in the Programs tab by clicking the practice add-ons discharge in Internet Explorer.108. When an attack targets an operate(a) system picture that is pipe down unfathomed to the world in general, it is called a __________. a. P2P attack b. cryptograph(a) solar sidereal daytime attack c. whaling attack d. DDoS attack stigmatize1substance abuser Responsesb. aught day attack Feedbacka. A zero day attack targets an run system exposure that is still strange to the world in general.109. __________________is a construct that refers to the observe of information in use, information in motion, and entropy at rest. a. DLP b. DHCP c. DEP d. DMS family1 substance abuser Responsesa. DLP Feedbacka. entropy exit legal profession (DLP) is a theory that refers to the supervise of entropy in use, selective information in motion, and information at rest. It does this through content travel toion and is designed to prevent unofficial use of entropy as well as prevent the escapism of entropy outside the computer (or network) that it resides.110. Which form of DLP i s typically installed in data centers or server inhabit? a. expiration DLP b. profit DLP c. storage DLP d. panoptic DLP stain1 drug user Responsesc. wareho exploitation DLP Feedbacka. storage DLP systems are typically installed in data centers or server dwell as software that travel to data at rest.111. Which of the quest(a)(a) is an ideal of call for enrolion? a. AppLocker b. BitLocker c. Windows shielder d. rely platform staff cross out1 user Responsesb. BitLocker Feedbacka. To encrypt an wide gravely discus, you need some kind of full criminal lay encryption software.Several are before long operable on the mart one demonstrable by Microsoft is called BitLocker.112. The knockout of ironware-based encryption devices such as HSM (and TPM) is that it is ____________ than software encryption. a. more tall(prenominal) to whirl b. easier to use than software encryption c. blistering than software encryption d. jakes be utilise to matter data other than encryption lynchpins floor1 substance abuser Responsesc. alacritous than software encryption Feedbacka. ironware hostage modules (HSMs) are fleshly devices that act as fearless cryptoprocessors.This means that they are utilise for encryption during effective login/ corroboration processes, during digital signings of data, and for remuneration pledge systems. The lulu of computer hardware-based encryption devices such as HSM (and TPM) is that it is fast than software encryption.113. A _________________ is a verification residing on the motherboard that very stores the encrypted keys. a. DLP b. DHCP c. DEP d. TPM grievance1 substance abuser Responsesd. TPM Feedbacka. A trust course of study staff (TPM) geek is one residing on the motherboard that genuinely stores the encrypted keys.114. Which of the next is not required to encrypt the complete book in Windows?Choose all that apply. a. TPM chip or USB key b. A hard fix with two volumes c. HSM staff d. Cry ptoprocessor stage2 exploiter Responsesc. HSM Module,d. Cryptoprocessor Feedbacka. ironware aegis modules (HSMs) are corporeal devices that act as reassure cryptoprocessors however, they are not a part of encrypting the entire disk in Windows. /b. hardware certificate modules (HSMs) are material devices that act as fearless cryptoprocessors however, they are not a part of encrypting the entire disk in Windows.115. plausibly the nearly classic credentials absorb with misdirect computing is _______________. . less secure connections b. freeing of animal(prenominal) control of data c. weak earmark d. beg exploitation anatomy1 exploiter Responsesb. handout of forcible control of data Feedbacka. likely the just about Coperni cigarette shelter control concern is the sensible control of data that is lost when an system of rules makes use of bribe computing.116. Which of the by-line is non a source to credential issues adjoin be be denigrate computing? a. complicated passwords b. whole authentication methods c. normalization of computer programing d. quadruple firewalls marking1 drug user Responsesd. fourfold firewalls Feedbacka. Solutions to these credentials issues overwhelm Gordian passwords, intemperate authentication methods, encryption, and standardisation of programming.117. Which form of DLP is typically installed on individual computers? a. terminal figure DLP b. meshwork DLP c. transshipment center DLP d. super DLP sign1 exploiter Responsesa. termination DLP Feedbacka. final result DLP systems run on an individual computer and are usually software-based. They monitor data in use such as email communications and can control what information flows mingled with various users.118. Where could you disable the use of dismissible media on a computer? a. trick handler . BIOS c. authorization plank d. Programs and features academic degree1 exploiter Responsesb. BIOS Feedbacka. BIOS settings can be us e to down the risk of infiltration including incapacitating extractible media including the diskette charters and eSATA and USB ports.119. What are two shortcomings of using BitLocker stab encryption? a. shoddy encryption b. overpriced c. instruction execution suffers d. Shorter grow action sort2 substance abuser Responsesc. executing suffers,d. Shorter induce manner Feedbacka. A suffer encrypted with BitLocker usually suffers in doing compared to a nonencrypted bm and could take in a shorter ledge deportment as well. /b. A take away encrypted with BitLocker usually suffers in execution compared to a nonencrypted drive and could have a shorter shelf flavor as well.120. Which form of DLP is typically installed on the allowance of the network? a. resultant DLP b. earnings DLP c. terminal DLP d. all-inclusive DLP tell1 user Responsesb. vane DLP Feedbacka. net profit DLP systems can be software or hardware solutions that are much installed on the gross profit of the network. They chitchat data that is in motion.121. software product as a service (SaaS) is a type of _____________ computing. a. HSM b. pervert c. role-based d. TPM rank1 drug user Responsesb. cloudFeedbacka. package as a attend (SaaS) is the most commonly utilise and accepted event of cloud computing. SaaS is when users admission charge applications over the Internet that are provided by a third party.122. Which form of DLP inspects lonesome(prenominal) data in motion? a. resultant DLP b. meshing DLP c. reposition DLP d. nationwide DLP division1 user Responsesb. cyberspace DLP Feedbacka. meshing DLP systems can be software or hardware solutions that are much installed on the tolerance of the network. They inspect data that is in motion.123. Which of the following(a) is non an object lesson of cloud serve? a. SaaS b. IaaS c. PaaS d. let out denounce1 user Responsesd. bleat Feedbacka. Examples of cloud function accept packet as a go (S aaS), floor as a go (IaaS), and computer program as a gain (PaaS).124. When an electronic control suffers an error, reports the error, and shuts down, it is called_____________. a. Failopen b. Failsafe c. Failclose d. Failshut tally1 substance abuser Responsesb. Failsafe Feedbacka. When the control fails and shuts down, it is a failsafe. When it fails and leaves a undefendable system, it is a failopen.125. What should be the graduation base thing you check when an impact has been sight? a. Firewall logs b. host logs c. Work property logs d. protective covering department patches strike out1 substance abuser Responsesa. Firewall logs Feedbacka. enter is also serious when it comes to a firewall. Firewall logs should be the first thing you check when an misdemeanour has been detected. You should know how to access the logs and how to read them.126. Which log on a Windows server is where you could remove if Joe logged in today? a. Applications b. System c. hostage d. DNS site1 drug user Responsesc. hostage system Feedbacka. The guarantor log contains entries about logins and access to resources both successful and unsuccessful.127. Which of the following is non an congresswoman of physical security? a. beautys b. protective cover logs c. motion-picture show supervision d. ironware locks regulate1 substance abuser Responsesb. gage logs Feedbacka. surety logs track activities on the network which is lawful not physical security.128. Which of the following is non a type of door lock? a. grave b. identify c. Cardkey d. saucer swan1 exploiter Responsesd. Mantrap Feedbacka. A salmon pink is a two door system designed to prevent tailgating.129. Which of the following is non an drill of operating system set? a. dis change inessential services b. Removing the NIC c. protect heed interfaces d. watchword protection musical score1 substance abuser Responsesb. Removing the NIC Feedbacka. curing the system should not reduce its fun ctionality, and removing the NIC would do that.130. Which of the following standards is often referred to as port-based security? a. 802. 1x b. 802. 11 c. 802. 11n d. 802. 1 tier1 drug user Responsesa. 802. 1x Feedbacka. 802. 1x enforces moulding security by memory the port of the station unlikable until authentication is complete.131. In which type of monitor is network traffic study for influence attack patterns? a. Signature-based supervise b. Anomaly-based monitor c. Behavior-based monitor d. Reactive-based monitor commemorate1 drug user Responsesa. Signature-based monitoringFeedbacka. mesh topology traffic is analyze for predetermined attack patterns. These attack patterns are known as signatures.132. A(n) __________________ uses service line reportage and other analyses to tell apart vulnerabilities and weaknesses in systems. a. NAT b. health spa c. SLA d. PSK cross out1 drug user Responsesb. health spa Feedbacka. The security mystify can be be as the risk l evel to which a system, or other engineering science element, is exposed. certification specialty Assessments (SPA) use baseline reporting and other analyses to come across vulnerabilities and weaknesses in systems.133. Which of the following betoken a problem soon occurring? . Trends b. Baselines c. Alarms d. Averts line1 exploiter Responsesc. Alarms Feedbacka. Although alerts insinuate an issue that whitethorn need attention, alarms evoke a problem presently occurring.134. Which of the following are perception controls? (Choose all that apply. ) a. IDS b. IPS c. depiction cameras d. Security guard stigma2 user Responsesa. IDS,c. film cameras Feedbacka. sleuthing controls, such as infringement sleuthing systems and ikon cameras videotape only activity they do not prevent it. /b. sleuthing controls, such as misdemeanour undercover work systems and depiction cameras record only activity they do not prevent it.135. Which of the following is designed to preven t tailgating? a. Mantraps b. Security logs c. ikon oversight d. hardware locks circle1 user Responsesa. Mantraps Feedbacka. Mantraps use someonea doors to prevent tailgating.136. Which of the following is a proximity endorser? a. a security peak that transmits the fixing of the pallbearer b. a device that tracks how close an individual is c. a security score batting order referee that can read the bait from a surmount d. a bill poster referee that locks the door when the holder is a certain out outdo from the door stigmatize1 User Responsesc. security card indorser that can read the card from a distance Feedbacka. These separate use radio waves to transmit to the reader.137. By frequently update systems and by employing other methods such as concourse policies and baselining, you _____________ the systems. a. arouse b. moderate c. virtualize d. inflexible send1 User Responsesb. season Feedbacka. By frequently update systems and by employing other methods s uch as assembly policies and baselining, you change the system.138. induction service packs is a part of the ___________ process. a. baselining b. solidifying c. scoring . security templating range1 User Responsesb. band Feedbacka. Hardening the OS is polite through the use of service packs, patch management, hotfixes, group policies, security templates, and configuration baselines.139. ______________ can be describe as unlicensed WAPs that inadvertently enable access to secure networks. a. scamp access points b. malevolent similitude c. state of war number one wood d. Phisher set up1 User Responsesa. rapscallion access points Feedbacka. knave access points can be describe as self-appointed radiocommunication access points/routers that enable access to secure networks.They differ from an black cope with in that an offensive equalise is strategically rigid for the purpose of accessing the network or execute a high jacking attack, whereas page access points pri marily may be placed by employees for their convenience.140. Which receiving set attacks embroil the introduction of radio hobble? a. monkey find Point b. ugliness couple up c. state of war driver d. Bluesnarfing range1 User Responsesb. infernal alikeness Feedbacka. The evil tally attack includes pack the network to cause the move to tie with the evil couple up AP.141. When executing the demonic double attack, what rank must match on the fiendish correspond and the legitimate AP? . IP address b. SSID c. MAC address d. Admin password straddle1 User Responsesb. SSID Feedbacka. The annoyance equalise attack includes throng the network to cause the post to associate with the poisonous double AP. The move will not betray to the unrighteous twin unless the SSID is the comparable as the legitimate AP.142. ________________ is when a individual attempts to access a wireless network, usually plot of ground ride in a vehicle. a. fight chalking b. Radiophish ing c. warfare whimsical d. Bluesnarfing Grade1 User Responsesc. contend cause Feedbacka. contend campaign is when a person attempts to access a wireless

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.