Front | Back |
What can you
detect by analyzing a data packet?
|
Policy
violations and network vulnerabilities
N/A
|
Which of the
following is true about Net Witness investigator?
|
Analyzes static and real-time data.
N/A
|
What is used by TCP to establish a session between two
systems?
|
Three-way Handshake
Ch. 2, 69
Ch 4, 121
|
Which of the following protocols is a
connection-oriented protocol that operates at the transport layer of the OSI model
and supports reliable connections?
|
TCP
Ch. 2, 65,69 |
Promiscuous mode is most commonly associated with
which of the following?
|
A network interface.
N/A
|
Which of the following is NOT a primary
objective of information security?
|
Privacy
Ch. 1, 6
|
Personnel should be authenticated and authorized prior
to being granted access to company’s information resources. This statement is
an example of which of the following?
|
Policy
Ch 1, 9
|
Which security group is responsible for managing
network vulnerabilities and threats?
|
IIT security staff
Ch. 1,12
|
Which network component filters traffic between nodes?
|
Firewall
Ch2, 44
|
Which is the most important consideration when
designing a network?
|
Ability to meet business needs.
Ch1, 10
|
What is usually the first activity in the hacking
process?
|
Reconnaissance
Ch4,119
|
Which of the following might a hacker offer as a
service?
|
DoS attack, spam distribution and
password cracking.
Ch4, 113
|
Which of the following IT domains is most vulnerable
to social engineering?
|
User
Ch4, 115
|
What type of attack can result in arbitrary code
execution with system-level privileges?
|
Buffer Overflow?
Ch4, 134
|
Which of the following is a social engineering
technique?
|
IImpersonation, Reciprocity and Phishing.
(All of these).
Ch4, 129, 144, 145
|