Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?
A. SuperScan
B. Netscan
C. Hping
D. Nmap
Which of the following tool is used for passive attacks to capture network traffic?
A. Intrusion prevention system
B. Intrusion detection system
C. Sniffer
D. warchalking
E. None
What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.
A. Zombie ignores unsolicited RST, and IP ID remains unchanged.
B. The attacker sends a SYN/ACK zombie.
C. In response to the SYN, the target to send RST.
D. Zombie IP ID will increase by only 1.
E. Zombie IP ID 2 rises.
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?
A. Preventative
B. Reactive
C. Retrospective
D. Defense-in-depth
Which of the following helps in viewing account activity and events for supported services made by AWS?
A. AWS CloudFormation
B. AWS Certificate Manager
C. AWS CloudHSM
D. AWS CloudTrial
Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.
A. Technical control
B. Environmental control
C. Physical control
D. Administrative control
An attacker has access to password hashes of a windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?
A. XSS
B. Rainbow table
C. Brute force
D. Dictionary attacks
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
A. Verification
B. Mitigation
C. Remediation
D. Assessment
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other function(s) of the device? (Choose all that apply.)
A. Enables input/output (I/O) operations
B. Provides access memory, achieving high efficiency
C. Manages security keys
D. Assigns user addresses
Which of the following protocols is a method for implementing virtual private networks?
A. SSL
B. PPTP
C. TLS
D. SNMP