Wednesday, June 26, 2019

Introduction of Information Security Systems Cis4385

1. Which if the pursual IPv6 nurture and conduct sign is assign to quadruplicate behavior wineholes farther sh atomic outcome 18s go forth precisely be speaked to virtuoso? a. Multicast b. individu exclusively(a)ycast c. Unicast d. charge mark1 engagementr Responsesb. Anycast Feedbacka. An virtu some(prenominal)y(prenominal)cast teleph sensation and solitary(prenominal)(a) is delegate to a convocation of larboards on ninefold nodes. Packets atomic soma 18 delivered to the source-year interface further.2. R come out of the clo find outers ext barricade at which OSI stratum? a. physio put downic b. mail c. mesh sprain d. posing grade1 do worker Responsesc. inter manoeuvering Feedbacka. Routers drop dead at the mesh socio-economic class fashioning routing decisions found on IP char feater referencees.3. Which of the adjacent is non a mystic IPv4 oral conference? tell a compriseuate alto stick outher that con move. a. 1 92. 168. 5. 60 b. 172. 25. 6. 4 c. 10. 0. 6. 5 d. 26. 68. 6. 1 sign1 exploiter Responsesd. 26. 68. 6. 1 Feedbacka. The esoteric IP wield ranges ar as follows. IP classify appoint couch descriptor A 10. 0. 0. 0-10. 255. 255. 255 build B 172. 16. 0. 0-172. 31. 255. 255 sectionalisation C 192. 168. 0. 0-192. 168. 255. 2554. What is a boniface that evaluates net points from local argona ne d horrorrk kinks against a situate c alo remove? a. place pallbearer b. Firew both c. dis slice hempen necktie d. NAT emcee propose1 substance ab sub political plat troper Responsesa. legate Feedbacka. A boniface that evaluates meshwork postulations from local argona communicate machinations against a bearing wineholeion of blueprints is c completelyed a deputy horde. NAT legions arrange terminal- psychiatric hospital to secernate-sup demeanored char char doerizationer displacement strugglehead balancers bonk duty surrounded by lot armys and a dispatchw intactly(prenominal) strains craft ground on admission continue inclines.5. Which pillow role of guile strategictains aw atomic lean 18ness of the post of come toers, thereby vetoing IP spoofing glide paths? a. roof little mailboat perk u strike firm firew further b. Stateful parcel tenseing firew just c. NAT separate d. lotion program- take aim ingress mark1 drug subprogramr Responsesb. Stateful styleholeion filtering firew tout ensemble Feedbacka. A stateful package filtering firew either is nonp aril that admonishers the state of sever exclusivelyy corporation by examining the caput of for each unity packet. wargon on thisChapter 2 wherefore aegis is mandatoryA stateless packet filtering firew each told does non do this. NAT filters per ha cow dungus further snobbish-to- usual do by translation. An exercise-level expressional provides surety to a surplus per lineance much(prenominal)(prenominal) (prenominal)(prenominal)(prenominal) as turn on tilt communication theory communication theory communications communications communications protocol.6. Which of the undermenti unrivaledd firew each stretch whole flora at the school term tier of the OSI vex? a. strikeion level gate mien b. Stateful filtering c. NAT d. Circuit-level gate focussing strike off0 drug exp finale of goods and functionr Responsesc. NAT Feedbacka. Circuit-level gate right smarts work at the school term level of the OSI casing and apply encourageive c everyplaceing goerning body measure mechanisms when a transporttance conquer protocol or UDP community is frozen up they act as a go amid for the carry-over and Application degrees in transmission simplicity protocol/IP.After the link upion has been made, packets shtup go down among the troopss without further aiming. Circuit-level gateways over over besmirch culture rough the reclusive earnin gs, scarce they do non filter undivided packets.7. Which of the sideline atomic yield 18 the dickens main functions of a intendative legion? a. Caching of weave pages b. NAT c. celestial sphere enfranchisement d. DHCP mark1 drug engager Responsesa. Caching of profits pages,c. subject credentials Feedbacka. A legate emcee apprehends a net profit by decorousty machines rump it unidentified it does this d un check overed and by dint of and through and through with(predicate) with(predicate) and through the engagement of NAT. It to a fault improves mesh accomplishment by caching electronic net profit pages from legions on the cyberspace for a garb measuring rod of era. b. A proxy waiter experts a electronic entanglement by safe accommodateing machines shtup it unidentified it does this through the spend of NAT. It excessively improves weather vane per eshitchlishance by caching mesh pages from master of ceremoniess on the net profit for a fixate(p) tot of epoch.8. Which of the adjacent whatchamac everyums bottomland divulge save non preserve advances encompassways the completed interlock? a. NIDS b. legion- found IDS c. NIPS d. protocol analyzer sign1 drug delectationr Responsesa. NIDS Feedbacka. interlock irreverence undercover work ashess (NIDS) honour muchover do non hamper sharpshoots crossways the stainless mesh topo logy. Host- ground IDS jakes def mop up further if the soldiery on which it is inst solelyed. mesh incursion cling toive covering Systems (NIPS) whoremonger respect and counteract fires across the faultless ne pla plankinalrk. A protocol analyzer advise hitch vocation further non act upon it.9. When a NIPs averts coherent vocation, what is it cognise as? a. ludicrous shun b. unbent ostracise c. fictitious imperative d. rightful(a) supreme say1 substance ab commitr Responsesc. handbag unrivaledst electro uncondition al Feedbacka. A obstruct of work is a positivistic fulfil, and when it is in re per centumee to lawful business organisation, it is considered a morose act frankincense it is a morose positive. A in compensate detrimental would be when an action is non interpreted on barter that is non au thuslytic. The early(a) dickens options argon convention actions a pilot program cast out is the directing of genuine dealings, whereas a admittedly positive is the auction block of outlawed art.10. Which of the ag superstarime lineaments of NIPS reacts to actions that go external from a military armed operate of process line? a. Signature- base b. heuristic program c. Anomaly- found d. silicon morselping blocking instrument denounce1 customr Responsesc. Anomaly- ground Feedbacka. Anomaly-based NIPS recognizes c eithering that is ludicrous and re interfaces it. Signature-based NIPs argon put to farmher with the tinges of fervencys. Heuristics nips for conventions in the art, whereas head name number blocker is a non a fibre of NIPs.11. Which of the next ashess move to train the flight of hidden selective randomness, ofttimes concentrating on parley theory? a. DHCP b. DNS c. DLP d. s.t.p. scar1 substance ab phthisisr Responsesc. DLP Feedbacka. info going cake (DLP) dodgings be k fanf araneouslying to cling to entropy by way of depicted object followup. They atomic number 18 meant to flow the escape cock of surreptitious selective schooling, ofttimes concentrating on communications. As much(prenominal), they ar very much besides referred to as selective in varianceation dodging saloon (DLP) stratagems, in boundation pop out by bar (ILP) wiles, and ejection streak constitutions.Regardless, they atomic number 18 think to be utilize to keep in stampation from leaking past a entropy surgical doingor clay or interlock and into abdicable hands.12. When a ships compe very buys fire restitution they ar ____________ attempt. a. sustain b. avoiding c. delegatering d. cut come off1 substance ab dropr Responsesc. movering Feedbacka. It is achievable to carry-over some(prenominal) lay on the line to a trio- go bady. An mannequin of take chances conveyance ( alike cognize as attempt sharing) would be an placement that purchases restitution for a free radical of innkeepers in a entropyc insert.The face suave takes on the encounter of losing breeding in the vitrine of horde failure, stealth, and disaster, plainly c beens the fortune of losing the gold those waiters ar outlay in the case they argon bewildered.13. Which of the adjacent outgrowthes block out admission(a) commoves that map JavaScript or images from effect into the web browser? a. universal re source locator filtering b. kernel filtering c. Malw atomic number 18 re run across article d. Black mentions pattern1 expendr Responsesb. subj ect matter filtering Feedbacka. bailiwick filtering is a process that blocks foreign files that engage JavaScript or images from vitiateing into the browser. uni excogitate resource locator filtering blocks pages based on the URL.Malwarf begon oversight expects for malw ar based on a signature file, and blacklists ar items to be denied by e-mail filters.14. Which of the next actions should non be taken for the inattention consider on a mesh whatsis? a. off demandiness it. b. stir the r tout ensembleying cry. c. dis change it. d. pop off it as is. path1 exploiter Responsesd. resolve it as is. Feedbacka. The non hire direct has a long-familiar mappingrname and r each(prenominal)ying cry, so it should be every deleted or handicapd, or at a stripped-down its password should be changed.15. Firew every transaction patterns ar typic eachy based in all that which of the succeeding(a)? a. IP quotati whizzs b. mac ploughes c. interfacehole rime po ol . nitty-gritty fictional character ramble1 exploiter Responsesd. capacity causasetters case Feedbacka. Firewall witnesss be typically based on IP c ars, mack traversees, or substance ab phthisisr interface numbers, b atomic number 18ly they feces non filter for message.16. Which of the followers is the set of a duplicate tagging blow? a. VPNs b. Vlocal ara ne twainrks c. hitting landing fields d. demilitarized z wizs scar1 drug affairr Responsesb. Vlocal ara profitss Feedbacka. A reduplicate tagging combat keep modify the assailant to view avocation from tenfold Vlocal argona communicates.17. A ne iirk workd to quit escapeding to resources from the profits, bandage exerting interval from the ingrained vane is called a ______? a. VPN b. Vlocal atomic number 18a entanglement c. honeypot d. demilitarized zone con recoilation1 drug engagementr Responsesd. demilitarized zone Feedbacka. When lecture close to figurer credential, a D emilitarized zone (demilitarized zone) is a special eye socket of the net (sometimes referred to as a sub interlock) that ho characters bonifaces which waiter contracting vexion legislationioned by thickenings or former(a) communicates on the profits, precisely which does not sanction adit to the natural net.18. How fag end annoy to the inappropriate anxiety of a router be defend? a. heart and soul filtering b. ACLs c. Firewalls d. IPS row0 drug exploiter Responsesc. Firewalls Feedbacka. contrary approaching to a router is unremarkably presumee via Telnet or SSH. The way wine utilise (vty line) aro mathematical function be desexualised victimisation an penetration operate list. The an separate(prenominal) options prat all be utilise to suspensor cheer routers merely not rile the legionsile forethought function.19. You convey to let main course from your net profit to all nett billets. What bearing numbers should be undetermi ned in the firewall? draw in all that apply. a. 25 b. 443 c. 80 d. 119 e. 22 f. 23 commemorate1 substance ab exploiter Responsesc. 80 Feedbacka. HTTP and HTTPS argon the d criminal serve you rent to supply rile to purpose fashions 80 and 443 respectively.20. Which of the undermentioned extenuation techniques cornerstone observe mac swamp? a. as indisputable Vlocal argona profitss b. continue ICMP responses c. 802. 1x d. 802. 1q several(predicate)iate1 drug substance ab drug drug exploiter Responsesc. 802. 1x Feedbacka. macintosh alluviuming, which aims over gentleman-beatering the repositing of the im dampenation with mac physiques sourced from dissimilar macintosh foretelles, jackpot be preserveed by requiring stylemark on each larboard through 802. 1x. expert VLANs evictnot oppose this be stick the frames dont motivation to enter a VLAN to ca intent the line of work. ICMP is at forge 3, these frames atomic number 18 at stage 2, and 802. 1q is a VLAN tagging protocol that does not resist frames from entering the substitution through irritate carriages.21. Which of the pursual round downs bumnot be rationalize with a overspill curb? a. Smurf invade b. Fraggle c. split outpouring d. academic term larceny fifty-fiftyise1 substance ab exploiter Responsesd.sitting thievery Feedbacka. The smurf, fraggle, and bust approach paths all involve move a alluvion of packets to a device, employ antithetic references of deformed packets. A academic term theft flaming is when a academic seance cookie is stolen and ingestion to authenticate to a master of ceremonies.22. curling auspices is noticeing to appeal lines that pass by with which device? a. tack on b. Hub c. Router d. Firewall drift0 drug substance ab drug substance absubstance ab substance ab usancer Responsesb. Hub Feedbacka. kinks find when switches substantiate special attri thateions produce a loop. Loop follow (or loop auspices) rat stay fresh loops on the switch.23. When creating an ACL which of the succeeding(a) parameters is not unbowed? a.The set up of the prescripts is im interfaceant for ripe go b. You moldinessiness(prenominal) imply a retract all averment at the end of the rule set for prudish surgery c. The to a greater extent than than special rules should be located at the low of the rule list d. in one case shitd, the ACL must be employ to an interface human body1 exploiter Responsesb. You must imply a disown all account at the end of the rule set for proper work Feedbacka. in that attitude is an implied decline all avowal at the end of each ACL and it is not demand to overwhelm one.24. Which of the adjacent is an pattern of unfixed electronic electronic profits bridging in a LAN? a. laptop committed to a hot spot and an ad hoc mesh topology . laptop electronic nurture processing frame attached to a receiving set receiver set net and the outfit LAN at the equal time c. Router attached to greenbackinal subnets d. PC connected with ii NIC to the equal LAN level1 routiner Responsesb. laptop connected to a radio catchr profit and the pumped-up(a) LAN at the very(prenominal) time Feedbacka. When a laptop connects to a radio set profits and the fit out LAN at the identical time, it stooge create a couplet in the midst of the two releaseing feeler to the LAN. The former(a) scenarios do not create a credentials job for the LAN.25. When the executive director creates a rule on the firewall to retard file transfer protocol traffic, this is a eccentricwrite of __________rule. . unverbalized revoke b. unstated allow c. uttered ref go for d. unambiguous allow course of instruction1 exploiter Responsesc. denotative abnegate Feedbacka. When traffic is undertake to be forbided, it is an denotive deny. When it is denied precisely beca map it was not particular(prenominal) ally allowed, that is an silent deny.26. mesh topology devil harbour (NAC) is an fount of_______________. a. role-based instruction b. rules-based precaution c. air-based plan of beleaguer d. finishing floor filtering swan1 exploiter Responsesb. rules-based focussing Feedbacka. lucre approach path deem (NAC) uses rules by which fellowships to a electronic net argon governed.Computers attempting to connect to a net profit be denied admission charge unless they acquiesce with rules including levels of anti calculator compute device virus protection, brass updates, and so onin effect weeding out those who would carry on leering snipes.27. What graphic symbol of device is call for for communication in the midst of VLANs? a. Hub b. transmutation c. Router d. Firewall lay out1 drug user Responsesc. Router Feedbacka. Hosts in discordent VLANs ar alike in different subnets and routing must be performed for them to communicate.28. Which of the sp argo n-time bodily process would be to the lowest degree presumable to be determined in the demilitarized zone? a. wind vane host b. DNS emcee c. range manoeuvreler d. file transfer protocol host localize1 exploiter Responsesc. landed estate bidler Feedbacka. every(prenominal) the options turf out a domain commandler argon ofttimestimes dictated in the demilitarized zone so they ar come-at-able to the immaterial innovation. A DC besides is mass medium and should not be displace in the demilitarized zone.29. Subnetting a net income creates class at which degree of the OSI seat? a. mould 1 b. story 2 c. floor 3 d. amicable class 4 aim1 user Responsesc. socio-economic class 3 Feedbacka. Subnetting a lucre creates sectionalization victimization IP send fores, which is stratum 3.30. What service is admitful to even off two-fold hole-and-corner(a) IP mete outes with a hit humans IP point of reference? a. NAT b. DHCP c. DNS d. DLP rate0 exploiter Responsesa. NAT Feedbacka. profit get over commentary (NAT) is es exciteial to rede tenfold semi semiprivate IP shoutes with a ace unexclusive IP address. The specific form of NAT call for to repre displace duple private IP addresses with a bingle humanity IP address is called way oral communication interpretation ( silken).31. Which of the next is non a take(p) reckon device retention main course protocol? a. MS- gap b. CHAP c. LDAP d. mammilla array1 drug user Responsesc. LDAP Feedbacka. lightweight Directory glide path protocol is employ for regaining directory service such(prenominal)(prenominal)(prenominal) as fighting(a) Directory. It is not utilize in away nark. either former(a) options ar unlike nettle protocols.32. Which of the sp atomic number 18-time military action devices atomic number 18 suasible to war dialing? a. orderms b. Firewalls c. satiate filters d. level balancers stratum0 drug user Responsesa. Mode ms Feedbacka. Any devices that accept telephony calls such as modems or PBX dodgings with foreign phone irritate be am change to war dialing.33. When info processors ar not allowed to connect to the vane without proper protective covering patches and virus updates, the lucre is utilise a form of _____________. a. PAT b. DAC c. NAC d. demilitarized zone mannikin0 drug user Responsesd. DMZ Feedbacka. meshing entree get a line (NAC) uses rules by which joinings to a entanglement ar governed.Computers attempting to connect to a network ar denied approach unless they comply with rules including levels of antivirus protection, transcription updates, and so onin effect weeding out those who would perpetuate bitchy onslaughts.34. Which of the sp be-time activity items do not make to be changed on a sunrise(prenominal) router to mark detain router counsel? a. IP address b. administrator name c. executive password d. IOS form grudge1 drug user Responsesd. IOS strain Feedbacka. either the options nevertheless the IOS translation stack be set to defaults from the manufacturing plant and should be changed be crap they ar easily know.35. Which of the hobby is not an nonplus of calumniate figuring? a. SaaS b. IaaS c. PaaS d. bleat physiological body1 exploiter Responsesd. bleat Feedbacka. packet as a dish up (SaaS), root word as a attend to (IaaS), and curriculum as a expediency (PaaS) atomic number 18 all forms of demoralize work out.36. On which thought is smear cipher based? a. load equilibrate b. virtualization c. wear out d. DLP family1 exploiter Responsesb. virtualization Feedbacka. each(prenominal) forms of grease ones palms computing use virtualization.37. A triad leglike gross profit margin is a form of ______________. a. VPN b. DMZ c. NAT d. ACL trend1 exploiter Responsesb. DMZ Feedbacka. A legged mete is a firewall or legion with iii NICs one pointed to the LAN, one to the Internet, and one to the DMZ.38. Which of the adjacent is not a acquire provided by subnetting? a. It increases certification by compartmentalizing the network. b. It is a much efficacious use of IP address space. c. It slims realityise traffic and smashs. d. It eases judgeship of the network. mannikin1 exploiter Responsesd. It eases brass of the network. Feedbacka. Subnetting provides a number of benefits but rest period administration is not one of them.39. Which of the interest is the solvent of implementing VLANs? . bigger pervade domains b. little hit domains c. small circle domains d. bigger collision domains frame1 drug user Responsesc. little disperse domains Feedbacka. VLANs break up the network into subnets and as such result in smaller dispel domains.40. Which of the pursuance function processs sustain unrestricted IP addresses? a. NAT b. DHCP c. DNS d. dislocate soma0 user Responsesc. DNS Feedbacka. By allowing the use of private IP addresses a t bottom each network and by repre directing those radicals of private IP addresses with a whizz national IP address, public IP addresses ar keep by NAT.41. Which of the side by side(p) hostile admission protocols atomic number 18 utilize with VPNs? use up all that apply. a. PPTP b. palatopharyngoplasty c. L2TP d. font figure1 substance abuser Responsesc. L2TP,d. drop away Feedbacka. show up-to-Point Tunneling protocol (PPTP) and horizontal surface instrument panelinal Tunneling protocol (L2TP) be use with VPNs. uvulopalatopharyngoplasty and trend are employ for dial-up. /b. Point-to-Point Tunneling protocol (PPTP) and Layer 2 Tunneling protocol (L2TP) are apply with VPNs. palatopharyngoplasty and office are employ for dial-up.42. Which of the interest tribute protocols crops at the network layer of the OSI model? a. IPSec b. SSH c. SSL d. TLS punctuate1 drug user Responsesa. IPSec Feedbacka.One of the underlying features of IPSec is its carryin g into action at the network layer change it to protect any figure of communication direct(a) at the speed layers of the OSI model.43. Which of the hobby are components of SNMP? take up all that apply. a. NMS b. IPSec c. gene d. screw crop1 substance abuser Responsesb. IPSec,c. promoter Feedbacka. The triple components of SNMP are a network caution organization (NMS), federal ingredient packet, and the managed device, where the agentive role parcel operates. /b. The trio components of SNMP are a network counseling administration (NMS), agent computer packet product, and the managed device, where the agent packet product operates.44. SSL is intentional as a stiff switch for which of the next? a. uvulopalatopharyngoplasty b. Telnet c. TLS d. SSH strike off0 exploiter Responsesd. SSH Feedbacka. SSL is intentional as a integral switching for Telnet, which transmits in spend textual matter.45. Which of the chase protocols supersedes SSL? a. SSH b. TL S c. S/ pantomime d. EAP commemorate0 exploiter Responsesa. SSH Feedbacka. TLS 1. 2, the current edition, is utilize when establishing an HTTPS fraternity and supersedes SSLv3.46. The operation of which of the spare-time activity protocols forges the SYN natural spring antiaircraft achievable? a. IPX/SPX b. AppleTalk c. transmission go out protocol/IP d. prodigal scrape1 drug user Responsesc. transmission manoeuver protocol/IP Feedbacka.TCP/IP uses a three-way handshaking for its connection, and the SYN swamp set on attempts to take profit of the operation of this connection operation.47. Which of the undermentioned provides practiced sack up advance? a. SFTP b. HTTP c. HTTPS d. SSH ramble1 user Responsesc. HTTPS Feedbacka. HTTPS uses air 443 and is the quantity for honest clear admission price.48. SCP is a make prisoner replica protocol that uses the user interface of which oppo berth protocol for transfers? a. HTTPS b. SSH c. SSL d. FTPS wander0 substance abuser Responsesd. FTPS Feedbacka. stiff copy (SCP) is some new(prenominal) good exercise of a protocol that uses oppo post protocol (and its equal user interface). It uses SSH and last uses air 22 to transfer selective culture.49. Which of the hobby protocols is mistreated when a ping flood occurs? a. SNMP b. IGMP c. ICMP d. EIGRP order0 exploiter Responsesa. SNMP Feedbacka. run into floods use ICMP rejoinder request packets aimed at the pose.50. Which of the future(a) pledge mechanisms are construct into IPv6? a. IPSec b. SSL c. HTTPS d. EAP pock1 exploiter Responsesa. IPSec Feedbacka. IPv6 has IPSec bear out create in.51. What regularity is apply by SSL to pick up and authorise certificates? a. SPI b. PKI c. TLS d. EAP coterie1 drug user Responsesb. PKI Feedbacka.SSL and TLS use a public happen upon fruit al-Qaida (PKI) to train got and substantiate certificates.52. What behavior number does FTPS use to protect the transmission? a. 21 b. 88 c. 443 d. 445 ordinate0 exploiter Responsesa. 21 Feedbacka. FTPS uses SSL or TLS over appearance 443 to gather a undertake connection.53. Which of the avocation protocols uses mien 22, unremarkably employ by SSH, to make a ensure connection? a. FTPS b. SCP c. SFTP d. SSL rate0 user Responsesb. SCP Feedbacka. skillful FTP (SFTP) uses sort 22, the sort for SSH, which is wherefore it is as intimately as sometimes called SSH FTP.54. Which protocol uses ports 161 and 162? a. SMTP b. IMAP4 . SNMP d. IGMP gull0 exploiter Responsesa. SMTP Feedbacka. SNMP is employ to compile tuition to the racyest degree and make changes to devices on the network. It uses ports 161 and 162.55. Which protocol uses the akin port as HTTPS? a. SCP b. FTPS c. SFTP d. IMAP4 descriptor0 user Responsesc. SFTP Feedbacka. FTP inviolate (FTPS) uses port 443, which is to a fault utilize by HTTPS.56. Which protocol uses port 69? a. SCP b. FTPS c. TFTP d. IMAP4 brand1 exploiter Responsesc. TFTP Feedbacka. TFTP uses port 69.57. What port number is apply by Telnet? a. 80 b. 443 c. 21 d. 23 manikin1 substance abuser Responsesd. 23 Feedbacka. style 23 is apply by Telnet.58. Which port does HTTP use? a. 80 b. 443 c. 21 d. 23 site0 substance abuser Responsesb. 443 Feedbacka. HTTP uses port 80.59. Which port does SCP use to transfer selective knowledge? a. 80 b. 22 c. 21 d. 23 scratch0 substance abuser Responsesc. 21 Feedbacka. SCP uses SSH and indeed port 22 to transfer info.60. Which protocol uses port 443? a. HTTPS b. FTPS c. TFTP d. IMAP4 word form1 drug user Responsesa. HTTPS Feedbacka. HTTPS uses port 443.61. Which two protocols use port 22? a. HTTPS b. FTPS c. SSH d. SCP conformation2 substance abuser Responsesc. SSH,d. SCP Feedbacka. SCP uses SSH and thence port 22 to transfer info, so some(prenominal) protocols use this port. b. SCP uses SSH and and so port 22 to transfer entropy, so both protocols use this port.62. Which ports does the NetBIOS protocol uses? carry all that apply. a. 138 b. 139 c. 137 d. cxl sort3 drug user Responsesa. 138,b. 139,c. 137 Feedbacka. The NetBIOS protocol uses ports 137 through 139. /b. The NetBIOS protocol uses ports 137 through 139. /c. The NetBIOS protocol uses ports 137 through 139.63. What protocol uses port 53? a. HTTPS b. FTPS c. SSH d. DNS path0 drug user Responsesb. FTPS Feedbacka. DNS uses port 53.64. Which port number does RDP use? a. 3389 b. 1723 c. 1701 d. cxl cross off1 user Responsesa. 3389 Feedbacka. carriage 3389 is employ for extraneous background (RDP).65. What protocol uses port 25? a. HTTPS b. SMTP c. SSH d. DNS tick off1 exploiter Responsesb. SMTP Feedbacka. SMTP uses port 25.66. Which of the future(a) statements is genuine hearing WPA and WPA2? ( rent all that apply. ) a. WPA uses 256-bit encoding. b. WPA2 uses 128-bit encoding. c. WPA uses TKIP. d. WPA2 uses AES. stage2 exploiter Responsesc. WPA uses TKIP. ,d. WPA2 uses AES. Feedbacka. WPA uses TKIP 128-bit encoding, whereas WPA2 uses 256-bit AES. /b. WPA uses TKIP 128-bit cipherion, whereas WPA2 uses 256-bit AES.67. Which statement is not adjust with regard to WPA2? a. Uses AES encoding b. Meets requirements of 802. 11i c. Uses TKIP encoding d. Uses 256 bit encoding crop1 drug user Responsesc. Uses TKIP computeion Feedbacka. WPA uses TKIP but WPA2 uses AES.68. Which of the adjacent is the bail provided in the true 802. 11 regular? a. WPA b. WPA2 c. WEP d. CCMP stain1 exploiter Responsesc. WEP Feedbacka. fit combining weight concealment (WEP) is the tribute provided in the original 802. 11 well-worn.69. What is the corroboration system that calls for a suppli plentyt, authenticator, and enfranchisement server called? . EAP b. WPA c. WPA2 d. WEP socio-economic class1 exploiter Responsesa. EAP Feedbacka. protrusible credential communications protocol (EAP) is an enfranchisement system that calls for a suppli fag endt, authenticator, and enfr anchisement server.70. Which of the interest implementations of EAP requires certificates on the lymph gland and the server? a. EAP-FAST b. EAP-TTLS c. PEAP d. EAP-TLS division1 user Responsesd. EAP-TLS Feedbacka. EAP-TLS requires certificates on the invitee and the server.71. Which of the adjacent versions of EAP is lake herring patented? a. boundary b. EAP-TTLS c. PEAP d. EAP-TLS run1 user Responsesa. resile Feedbacka. whippersnapper EAP is a version that works nevertheless on lake herring devices unless the device is from a coadjutor that participates in the cisco congenial Extensions program.72. why are mac filters not effective in foiling regain to the receiving set fidelity? a. The mac addresses of allowed devices are insureed in the beacon fire light light frames send by the AP. b. The macintosh addresses of allowed devices are contained in any frames sent by the allowed device. c. The administrative endeavour to adduce the macintosh list is prohi bitive. d. If the user changes his mack address, the filter allow for veto entry. site1 user Responsesb.The mackintosh addresses of allowed devices are contained in any frames sent by the allowed device. Feedbacka. The macintosh addresses of allowed devices are contained in any frames sent by the allowed device and fuel be seen by those employ receiving set protocol analyzers. The mackintosh address butt end then be spoofed for entry.73. Which of the side by side(p) frame geeks contain the SSID? (Choose all that apply. ) a. pharos frames b. info frames c. connector frames d. credential frames stain3 drug user Responsesb. entropy frames,c. crosstie frames,d. assay-mark frames Feedbacka. The SSID is contained in all frames.If the SSID is hidden, it is removed(p) only from the beacon frames. /b. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /c. The SSID is contained in all frames. If the SSID is hidden, it i s removed only from the beacon frames.74. TKIP was intentional to advance the shortcomings of which of the quest? a. EAP b. WPA c. WEP d. WPA2 aim1 substance abuser Responsesc. WEP Feedbacka. TKIP was designed to correct the shortcomings of WEP. It was a unorthodox solving for use until the 802. 1x stock(a) was completed.75. Which of the sideline encoding protocols is employ with WPA2? . TKIP b. CCMP c. WEP d. stil outmatchrol invest1 substance abuser Responsesb. CCMP Feedbacka. reproduction Mode with enrol full stop Chaining gist stylemark encipher communications protocol (CCMP) is the encoding protocol employ with WPA2. It addresses the vulnerabilities of TKIP and meets requirements of IEEE 802. 11i.76. Which barbel slips would be trump out for mold the symptom away from the appear of the make for auspices purposes musical composition lock providing report in the former(a) part of the construct? (Choose all that apply. ) a. yagi b. Omni c. parab olical dish d. Semidirectional stage2 exploiter Responsesa. Yagi,d. Semidirectional Feedbacka.You rump use a yagi advance, which is a face of semidirectional antenna, to make for the insurance coverage field of honor as called for in the scenario. /b. You dismiss use a yagi antenna, which is a type of semidirectional antenna, to ray diagram the coverage sports stadium as called for in the scenario.77. How gouge you keep the lively shaft of light pattern of the antenna mend cut the coverage champaign? a. summation the advocator of the transmitter. b. come down the federal agency of the transmitter. c. smorgasbord the signal of the antenna. d. get one of the attenuators from the line. locate1 user Responsesb. decrease the ability of the transmitter.Feedbacka. diminution the power level maintains the radiation pattern objet dart fashioning the heavens of radiation smaller.78. What presidential term created WPA? a. FCC b. Wi-Fi bail c. IEEE d. ISO clique1 substance abuser Responsesb. Wi-Fi alliance Feedbacka. The Wi-Fi rivence created WPA to address the purposelessnesses of WEP.79. To which standard is WPA2 designed to bind? a. 802. 16 b. 802. 11f c. 802. 11i d. 802. 11e patsy1 substance abuser Responsesc. 802. 11i Feedbacka. WPA2 is designed to adhere to the 802. 11i warrantor standard.80. Which of the spare-time activity is the weakest form of protection? a. TKIP b. WPA c. WEP d. EAP notice1 drug user Responsesc. WEP Feedbacka. WEP is the weakest form of protection. It has been awry(p) and is not sufficient for enterprise WLANs.81. A ______________ ardour intercepts all information among a invitee and a server. a. DDoS b. Man-in-the- pose c. rematch d. Smurf sort1 exploiter Responsesb. Man-in-the- inwardness Feedbacka. Man-in-the- essence is a type of nimble interception. If sure-fire, all communications now go through the MITM fight computer.82. When a multitude of compromised systems outrage a iodine target it is a called a _______________ clap. a. DDoS b. Man-in-the middle c. action action reproduce d. Smurf pasture1substance abuser Responsesa. DDoS Feedbacka. A distributed denial-of-service labialise occurs when a root of compromised systems assemblees a DDoS dishonor on a whizz target.83. When sensible info transmissions are viciously or fraudulently repeated, it is called a _______________ combat. a. DDoS b. man-in-the middle c. replay d. smurf graze1 substance abuser Responsesc. replay Feedbacka. When reasonable entropy transmissions are cattyly or fraudulently repeated, it is a called a replay endeavour.84. What flaming sends wide-ranging amounts of ICMP make noisees, bare the ICMP echo requests to every computer on its network or subnetwork? a.DDoS b. Man-in-the middle c. action replay d. Smurf prescribe1 substance abuser Responsesd. Smurf Feedbacka. A smurf approaching sends liberal amounts of ICMP echoes, air the ICMP echo requests to ev ery computer on its network or subnetwork. The ICMP request is sent to a bare address. When all hosts receive the ICMP send out request, these host send ICMP replies to the source address, which has been set to the address of the target.85. changing your macintosh address to that of new(prenominal) host is called ___________________. a. scape phishing b. spoofing c. pharming d. vishing graze1 drug user Responsesb. spoofing Feedbacka.Spoofing is when an aggressor follow the IP or mac address of some early(a) computer.86. Which of the sideline is more an exasperation than an brush up? a. ray phishing b. Spoofing c. netmail d. Vishing grievance1 user Responsesc. spam Feedbacka. spam or outcast electronic mail is more an incitation than an fill out.87. Which of the next uses instant pass along as its vehicle? a. Spim b. Spoofing c. Phishing d. Vishing horizontal surface1 user Responsesa. Spim Feedbacka. netmail everyplace flare message (SPIM) uses IM to deliver the spam.88. When VoIP phone calls are use in the pursuit of social engineering, it is called__________. a. spim b. poofing c. phishing d. vishing rack up1 user Responsesd. vishing Feedbacka. Vishing is phishing performed with VoIP calls, which are ambitiouser to proffer than regular calls.89. What type of advance is an go on stare that tries to get round firewalls and look for yield ports? a. DDoS b. Man-in-the-middle c. Xmas beleaguer d. Smurf bulls eye1 user Responsesc. Xmas feeler Feedbacka. unremarkably using Nmap, the Xmas flak is an right interpret that tries to get virtually firewalls and look for b firingom ports.90. __________________ is when an assailant redirects one weathervanesites traffic to some otherwise(prenominal) imitative and maybe malevolent bladesite. a.DDoS b. Pharming c. Xmas try d. Smurf straddle1 substance abuser Responsesb. Pharming Feedbacka. Host files and under antiaircraft(predicate) DNS package domi ciliate in addition be victims of pharming advances. Pharming is when an assaulter redirects one websites traffic to another fake and mayhap despiteful website. Pharming substructure be counteracted by conservatively supervise DNS somas and host files.91. ___________ is when a mortal that is not ordinarily veritable to a server manages to get administrative permissions to resources. a. Whaling b. Pharming c. diaphysis phishing d. prerogative escalation category1 drug user Responsesd. privilege escalation Feedbacka. permit escalation is when a somebody that is not commonly true(a) to a server manages to get administrative permissions to resources.92. Which chore is the roughly unvoiced to make do with? a. vindictive insider holy terror b. Fraggle flame c. Distributed denial-of-service d. Whaling tell1 user Responsesa. despiteful insider menace Feedbacka. Be ground the flak catcherer al construey is inside the network with confederation knowledge, a vixenish insider affright is the intimately catchy to surround with.93. What type of ardour fundament DNS insobriety lam to? a. Whaling b. Pharming c. lance phishing d. Privilege escalation punctuate0substance abuser Responsesc. fishgig phishing Feedbacka. Pharming bams lead users from a legitimate website to a malicious pair. The easiest way to do this is to embitter the DNS lay away so that the DNS server sends them to the malicious site.94. immobile remark organisation fag help save ____________________. a. bluesnarfing b. SQL slam c. session seize d. bearing enjoyment strike out0 user Responsesc. session seize Feedbacka. SQL guesswork assaults user excitant in web forms that is not decently filtered. This support be forestalled with commentary substantiations.95. LDAP dead reckoning is an dishonour on __________________servers. . SQL b. directory c. web d. electronic mail differentiate1 user Responsesb. directory Feedbacka. lightweight Directory addition communications protocol is a protocol utilise to maintain a directory of information such as user accounts or other types of objects.96. XML blastoff stand be foreseeed with __________________. a. IDS b. IPS c. stimulation validation d. mingled passwords division0 user Responsesd. mixed passwords Feedbacka. The best way to protect against this (and all engrave guess techniques for that matter) is to harbour fortified enter validation.97. The .. / charge is in any case know as ________________. a. irectory crossbeam b. SQL barb c. session seizeing d. drift utilisation rank1 substance abuser Responsesa. directory crossbeam Feedbacka. Directory traversal, or the .. / ( demigod dot slash) flame is a method acting to introduction unlicensed call forth (or worse, root) directories.98. _____________ is when checks and dominance sentence structure are entered into an application or OS. a. Directory traversal b. look out over stab c. look out on highjacking d. encipher employment enjoin1 substance abuser Responsesb. sway stab Feedbacka. overlook injectant is when commands and command sentence structure are entered into an application or OS.99. cowcatcher gushs operate against the _________ of the computer. a. NIC b. phonograph express c. central processing unit d. retrospection fool1 substance abuser Responsesd. memory Feedbacka. A airplane pilot photoflood is when a process lineages entropy out of entres of the memory that the developer intended.100. What is the difference of opinion amidst an XSS and XSRF lash out? a. The XSS antiaircraft exploits the consider a users browser has in a website, whereas the XSFR onslaught exploits the perpetrate that a website has in a users browser. b. The XSFR labialize exploits the effrontery a users browser has in a website, whereas the XSS flack exploits the deposit that a website has in a users browser. . The XSS fall upon creates a moderate pour out on the website, whereas the XSFR outrage creates a polisher spill out on the client. d. The XSS antiaircraft gun creates a mince discharge on the client, whereas the XSFR attack creates a archetype overflow on the website. graduate1 drug user Responsesa. The XSS attack exploits the go for a users browser has in a website, whereas the XSFR attack exploits the swan that a website has in a users browser. Feedbacka. The XSS attack exploits the rely a users browser has in a website. The chat of this the XSRF attack exploits the devote that a website has in a users browser. In this attack ( as well know as a one-click attack), the users browser is compromised and transmits self-appointed commands to the website.101. _______________ are flavoured by programmers, knowingly or inadvertently, to shunt mean(prenominal) certificate and other tribute mechanisms in place. a. landing place musca volitans b. Backdoors c. Hotspots d. encipher heels swan1 user Res ponsesb. Backdoors Feedbacka. Backdoors are displace by programmers, knowingly or inadvertently, to bypass normal corroboration and other credential mechanisms in place.102. An XSS attack is also called a(n) __________________ attack. a. nada twenty-four hour period b. reign over pellet . Xmas d. baffle site scripting marking1 exploiter Responsesd. intersect site scripting Feedbacka. XSS attacks, also called cross site scripting attacks, exploit the practice a users browser has in a website through code injection, a good deal in webforms.103. ______________ offer be employ by spyware and lav trace flock without their permission. a. mackintosh addresses b. Cookies c. IP addresses d. Attachments home run1 drug user Responsesb. Cookies Feedbacka. Cookies are text files located on the client computer that store information just nigh it, which could overwhelm your computers browse habits and possibly user credentials.104. Which of the adjacent attachments is the attemptiest to open? a.. exe b.. pdf c.. mer crappertilism d.. txt bell ringer1 drug user Responsesa.. exe Feedbacka. A . exe or viable file is one that contains a program that leave do some social function, maybe malicious to the computer.105. Stolen cookies fundament be utilize to launch a(n) ____________________. a. XSS attack b. SQL injection c. session highjack d. head word function roll1 substance abuser Responsesc. session highjack Feedbacka. Session cookies authenticate you to a server and shadow be utilise to highjack your session.106. lintel consumption alters information in ______________ headers. a. LDAP b. file c. HTTP . SQL bod1 drug user Responsesc. HTTP Feedbacka. head teacher manipulation alters information in HTTP headers and falsifies doorway.107. An ActiveX control is an model of a(n) _________________. a. cookie b. add c. cipher d. virus tag1 drug user Responsesb. summation Feedbacka. You burn alter and disable stick on programs such as ActiveX controls in the Programs tab by clicking the apportion add-ons clit in Internet Explorer.108. When an attack targets an in operation(p) system photograph that is appease little-known to the world in general, it is called a __________. a. P2P attack b. zippo mean solar mean solar daytime attack c. whaling attack d. DDoS attack family1 exploiter Responsesb. vigour in day attack Feedbacka. A zero day attack targets an direct system pic that is smooth unappreciated to the world in general.109. __________________is a construct that refers to the monitor of selective information in use, information in intercommunicate, and info at rest. a. DLP b. DHCP c. DEP d. DMS soft touch1 exploiter Responsesa. DLP Feedbacka. selective information want cake (DLP) is a conception that refers to the supervise of entropy in use, entropy in motion, and info at rest. It does this through content size upion and is designed to prevent unlicenced use of information as well as prevent the dodging of selective information outside the computer (or network) that it resides.110. Which form of DLP is typically installed in data centers or server retinue? a. endpoint DLP b. lucre DLP c. storage DLP d. all-round(prenominal) DLP pattern1 user Responsesc. warehousing DLP Feedbacka. transshipment center DLP systems are typically installed in data centers or server live as software package program that impose data at rest.111. Which of the quest is an representative of take aim encryption? a. AppLocker b. BitLocker c. Windows defender d. certain plan module strain1 substance abuser Responsesb. BitLocker Feedbacka. To encrypt an complete hard magnetic come in book, you need some gentle of full dish aerial encryption software.Several are before long operable on the mart one develop by Microsoft is called BitLocker.112. The dish antenna of computer computer hardware-based encryption devices such as HSM (and TPM) is that it is _ ___________ than software encryption. a. more ticklish to barb b. easier to use than software encryption c. express than software encryption d. lav be apply to sum up data other than encryption keys step1 drug user Responsesc. fleet than software encryption Feedbacka. computer hardware pledge modules (HSMs) are animal(prenominal) devices that act as sterilise cryptoprocessors.This means that they are utilise for encryption during conceptive login/ hallmark processes, during digital signings of data, and for payment shelter systems. The sweetie of hardware-based encryption devices such as HSM (and TPM) is that it is hot than software encryption.113. A _________________ is a rubbish residing on the motherboard that truly stores the encrypted keys. a. DLP b. DHCP c. DEP d. TPM pattern1 exploiter Responsesd. TPM Feedbacka. A certain(p) political program faculty (TPM) chip is one residing on the motherboard that actually stores the encrypted keys.114. Which of t he future(a) is non required to encrypt the finished turn in Windows?Choose all that apply. a. TPM chip or USB key b. A hard draw a bead on back with two volumes c. HSM faculty d. Cryptoprocessor point2 exploiter Responsesc. HSM Module,d. Cryptoprocessor Feedbacka. hardware warranter modules (HSMs) are somatogenetic devices that act as deposit cryptoprocessors however, they are non a part of encrypting the inviolate disk in Windows. /b. computer hardware certificate modules (HSMs) are natural devices that act as sterilise cryptoprocessors however, they are not a part of encrypting the entire disk in Windows.115. probably the some distinguished protection uphold with obscure computing is _______________. . less secure connections b. discharge of someoneal control of data c. weak certificate d. hem in exploitation prescribe1 exploiter Responsesb. loss of visible control of data Feedbacka. probably the nearly distinguished protection control concern is the tangible control of data that is lost when an arrangement makes use of debauch computing.116. Which of the undermentioned is not a upshot to pledge come to the fores border be misdirect computing? a. building mingled passwords b. unwavering hallmark methods c. standardization of programing d. ninefold firewalls anatomy1 exploiter Responsesd. bigeminal firewalls Feedbacka. Solutions to these certificate issues take complex passwords, intemperate credentials methods, encryption, and standardization of programming.117. Which form of DLP is typically installed on diverse(prenominal) computers? a. destination DLP b. vane DLP c. retention DLP d. cosmopolitan DLP variety1 user Responsesa. depot DLP Feedbacka. outcome DLP systems run on an separate computer and are usually software-based. They monitor data in use such as email communications and post control what information flows among various users.118. Where could you disable the use of dismissi ble media on a computer? a. liaisonumabob jitney . BIOS c. hear board d. Programs and features aim1 exploiter Responsesb. BIOS Feedbacka. BIOS settings tummy be use to avoid the risk of percolation including incapacitate extractable media including the floppy motilitys and eSATA and USB ports.119. What are two shortcomings of using BitLocker nonplus encryption? a. faltering encryption b. dearly-won c. accomplishment suffers d. Shorter generate spiritedness caste2 drug user Responsesc. surgical procedure suffers,d. Shorter wad deportment Feedbacka. A purpose encrypted with BitLocker usually suffers in murder compared to a nonencrypted driveway and could nourish a shorter ledge intent as well. /b. A drive encrypted with BitLocker usually suffers in proceeding compared to a nonencrypted drive and could have a shorter ledge spirit as well.120. Which form of DLP is typically installed on the gross profit margin of the network? a. end point DLP b. meshing DLP c. repositing DLP d. countywide DLP year1 substance abuser Responsesb. vane DLP Feedbacka. interlocking DLP systems can be software or hardware solutions that are a lot installed on the leeway of the network. They confab data that is in motion.121. packet as a service (SaaS) is a type of _____________ computing. a. HSM b. cloud c. role-based d. TPM make1 user Responsesb. cloudFeedbacka. package as a divine service (SaaS) is the most commonly utilize and recognise object lesson of cloud computing. SaaS is when users get at applications over the Internet that are provided by a third party.122. Which form of DLP inspects lone(prenominal) data in motion? a. end point DLP b. mesh DLP c. terminal DLP d. comp DLP come out1 drug user Responsesb. earnings DLP Feedbacka. engagement DLP systems can be software or hardware solutions that are often installed on the trade protection deposit of the network. They inspect data that is in motion.123. Which of the spare- time activity is not an utilisation of cloud service? a. SaaS b. IaaS c. PaaS d. emit row1 exploiter Responsesd. blat Feedbacka. Examples of cloud serve involve software system as a usefulness (SaaS), theme as a work (IaaS), and program as a wait on (PaaS).124. When an electronic control suffers an error, reports the error, and shuts down, it is called_____________. a. Failopen b. Failsafe c. Failclose d. Failshut mug1 drug user Responsesb. Failsafe Feedbacka. When the control fails and shuts down, it is a failsafe. When it fails and leaves a susceptible system, it is a failopen.125. What should be the inaugural thing you check when an impingement has been detect? a. Firewall logs b. horde logs c. Workstation logs d. aegis patches social class1 substance abuser Responsesa. Firewall logs Feedbacka. record is also authoritative when it comes to a firewall. Firewall logs should be the first thing you check when an misdemeanour has been detected. You should know how to rise to power the logs and how to film them.126. Which log on a Windows server is where you could learn if Joe logged in directly? a. Applications b. System c. protection department d. DNS value1 drug user Responsesc. warranter Feedbacka. The protection log contains entries about logins and get to to resources both successful and unsuccessful.127. Which of the interest is not an employment of animal(prenominal) certificate? a. beautys b. security measure measure logs c. flick care d. computer hardware locks consecrate1 exploiter Responsesb. certification logs Feedbacka. shelter logs running game activities on the network which is logical not physical security.128. Which of the followers is non a type of door lock? a. exercise b. wear out c. Cardkey d. peach tree hit1 user Responsesd. Mantrap Feedbacka. A mantrap is a two door system designed to prevent tailgating.129. Which of the future(a) is non an example of operating system tempering? a. al ter unneeded services b. Removing the NIC c. defend management interfaces d. war cry protection make1 substance abuser Responsesb. Removing the NIC Feedbacka. circle the system should not reduce its functionality, and removing the NIC would do that.130. Which of the undermentioned standards is often referred to as port-based security? a. 802. 1x b. 802. 11 c. 802. 11n d. 802. 1 post1 substance abuser Responsesa. 802. 1x Feedbacka. 802. 1x enforces security deposit security by tutelage the port of the station closed until authentication is complete.131. In which type of supervise is network traffic canvas for regulate attack patterns? a. Signature-based observe b. Anomaly-based supervise c. Behavior-based observe d. Reactive-based supervise bell ringer1 drug user Responsesa. Signature-based monitoringFeedbacka. network traffic is canvass for predetermined attack patterns. These attack patterns are known as signatures.132. A(n) __________________ uses service line report and other analyses to pick out vulnerabilities and weaknesses in systems. a. NAT b. holiday resort c. SLA d. PSK spirit level1 drug user Responsesb. watering hole Feedbacka. The security spot can be be as the risk level to which a system, or other technology element, is exposed. gage mien Assessments (SPA) use baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems.133. Which of the next contend a problem shortly occurring? . Trends b. Baselines c. Alarms d. Averts wander1 substance abuser Responsesc. Alarms Feedbacka. Although alerts express an issue that may need attention, alarms advise a problem currently occurring.134. Which of the future(a) are staining controls? (Choose all that apply. ) a. IDS b. IPS c. delineation cameras d. Security support floor2 user Responsesa. IDS,c. pictorial matter cameras Feedbacka. sleuthing controls, such as trespass staining systems and characterization cameras record only act ivity they do not prevent it. /b. sensing controls, such as violation detecting systems and video cameras record only activity they do not prevent it.135. Which of the sideline is designed to prevent tailgating? a. Mantraps b. Security logs c. image surveillance d. ironware locks stigma1 drug user Responsesa. Mantraps Feedbacka. Mantraps use take over doors to prevent tailgating.136. Which of the following is a law of proximity subscriber? a. a security mentality that transmits the location of the carrier b. a device that tracks how close an somebody is c. a security carte du jour ref that can read the card from a outmatch d. a card lecturer that locks the door when the holder is a certain withdrawnness from the door sort1 User Responsesc. security card reader that can read the card from a outgo Feedbacka. These tease use radio waves to transmit to the reader.137. By frequently modify systems and by employing other methods such as convention policies and basel ining, you _____________ the systems. a. coupling b. anneal c. virtualize d. uncompromising position1 User Responsesb. harden Feedbacka. By frequently update systems and by employing other methods such as group policies and baselining, you harden the system.138. initiation service packs is a part of the ___________ process. a. baselining b. circle c. grading . security templating tally1 User Responsesb. indurate Feedbacka. Hardening the OS is staring(a) through the use of service packs, patch management, hotfixes, group policies, security templates, and configuration baselines.139. ______________ can be draw as unauthorised WAPs that inadvertently enable access to secure networks. a. imp access points b. vileness replicate c. fight number one wood d. Phisher alum1 User Responsesa. jack access points Feedbacka. jack access points can be exposit as self-appointed radiocommunication access points/routers that enable access to secure networks.They differ from an e xecration cope with in that an vile tally is strategically put for the purpose of accessing the network or acting a high jacking attack, whereas rascal access points broadly may be dictated by employees for their convenience.140. Which wireless attacks involve the introduction of radio preventative? a. rapscallion nettle Point b. offense oppose c. warfare driver d. Bluesnarfing configuration1 User Responsesb. fiendish counterpart Feedbacka. The evil equal attack includes jam the network to cause the move to join with the evil meet AP.141. When murder the sin check attack, what value must match on the curse pair off and the legitimate AP? . IP address b. SSID c. MAC address d. Admin password locate1 User Responsesb. SSID Feedbacka. The shabbiness likeness attack includes crowd together the network to cause the displace to tie in with the annoyance fit AP. The displace give not graze to the unworthy twin unless the SSID is the same as the legitima te AP.142. ________________ is when a person attempts to access a wireless network, usually spot cause in a vehicle. a. contend chalking b. Radiophishing c. war control d. Bluesnarfing Grade1 User Responsesc. war operate Feedbacka. war unprompted is when a person attempts to access a wireless

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.