Which of the following is a session layer protocol?
#121
Answer: A✅ Correct❌ Incorrect
Which of the following IEEE standards provides specifications for wireless ATM systems?
#122
Answer: D✅ Correct❌ Incorrect
Which of the following UTP cables supports transmission up to 20MHz?
#123
Answer: C✅ Correct❌ Incorrect
Which of the following is also known as slag code?
#124
Answer: B✅ Correct❌ Incorrect
Which of the following commands is used for port scanning?
#125
Answer: B✅ Correct❌ Incorrect
How is an “attack” represented?
#126
Answer: B✅ Correct❌ Incorrect
Kelly is taking backups of the organization's data. Currently, she is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?
#127
Answer: B✅ Correct❌ Incorrect
Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.
#128
Answer: A✅ Correct❌ Incorrect
Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?
#129
Answer: B✅ Correct❌ Incorrect
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?
#130
Answer: B✅ Correct❌ Incorrect
Which of the following is not part of the recommended first response steps for network defenders?
#131
Answer: B✅ Correct❌ Incorrect
Which among the following tools can help in identifying IoEs to evaluate human attack surface?
#132
Answer: D✅ Correct❌ Incorrect
In ______ method, event logs are arranged in the form of a circular buffer.
#133
Answer: C✅ Correct❌ Incorrect
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
#134
Answer: B✅ Correct❌ Incorrect
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
#135
Answer: A✅ Correct❌ Incorrect
You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?
#136
Answer: C✅ Correct❌ Incorrect
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
#137
Answer: C✅ Correct❌ Incorrect
A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?
#138
Answer: B✅ Correct❌ Incorrect
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other.
How will they ensure the authenticity of their emails?
#139
Answer: C✅ Correct❌ Incorrect
Which characteristic of an antenna refers to how directional an antennas radiation pattern is?
#140
Answer: C✅ Correct❌ Incorrect
Disaster Recovery is a
#141
Answer: C✅ Correct❌ Incorrect
The CEO of Max Rager wants to send a confidential message regarding the new formula for its coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be altered in transit. How can he prevent this incident from happening and what element of the message ensures the success of this method?
#142
Answer: D✅ Correct❌ Incorrect
Identify the method involved in purging technique of data destruction.
#143
Answer: A✅ Correct❌ Incorrect
Which type of modulation technique is used in local area wireless networks (LAWNs)?
#144
Answer: A✅ Correct❌ Incorrect
Identify the correct order for a successful black hat operation.
#145
Answer: B✅ Correct❌ Incorrect
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?
#146
Answer: A✅ Correct❌ Incorrect
Which of the following incident handling stage removes the root cause of the incident?
#147
Answer: A✅ Correct❌ Incorrect
Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?
#148
Answer: B✅ Correct❌ Incorrect
Which NIST Incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
#149
Answer: B✅ Correct❌ Incorrect
James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?