Fill in the blank with the appropriate term. is a prime example of a high-interaction honeypot.
Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?
A. SuperScan
B. Netscan
C. Hping
D. Nmap
Which of the following networks interconnects devices centered on an individual person's workspace?
A. WLAN
B. WPAN
C. WWAN
D. WMAN
Which of the following encryption techniques do digital signatures use?
A. MD5
B. RSA
C. Blowfish
D. IDEA
Which of the following phases is the first step towards creating a business continuity plan?
A. Business Impact Assessment
B. Scope and Plan Initiation
C. Business Continuity Plan Development
D. Plan Approval and Implementation
What is the technique used in the cost estimates for the project during the design phase of the following? Each correct answer represents a complete solution. Choose all that apply.
A. expert assessment
B. The Delphi technique
C. Function point analysis
D. Program Evaluation Technique (PERT)
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?
A. Class C
B. Class A
C. Class B
D. Class D
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?
I. Zero-trust network model
II.
Castle-and-Moat model
A.
Both I and II
B.
I only
C.
II only
D.
None
Which of the following helps in viewing account activity and events for supported services made by AWS?
A. AWS CloudFormation
B. AWS Certificate Manager
C. AWS CloudHSM
D. AWS CloudTrial
Which of the following things need to be identified during attack surface visualization?
A. Attacker's tools, techniques, and procedures
B. Authentication, authorization, and auditing in networks
C. Regulatory frameworks, standards and, procedures for organizations
D. Assets, topologies, and policies of the organization
How can one identify the baseline for normal traffic?
A. When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection
B. When the RST flag appears at the beginning and the ACK flag appears at the end of the connection
C. When the ACK flag appears at the beginning and the RST flag appears at the end of the connection
D. When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection
You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?
A. A NIDS device would work best for the company.
B. A HIPS device would best suite this company.
C. The best solution to cover the needs of this company would be a HIDS device.
D. You are suggesting a NIPS device.
Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?
A. Procedures, Policies, Laws, Standards and Regulations
B. Laws, Regulations, Policies, Standards and Procedures
C. Regulations, Policies, Laws, Standards and Procedures
D. Laws, Policies, Regulations, Procedures and Standards
The _______ protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.
A. RARP
B. ICMP
C. ARP
D. DHCP
What command is used to terminate certain processes in an Ubuntu system?
A. # netstat Kill [ Target Process]
B. #ps ax Kill
C. #grep Kill [Target Process]
D. #kill -9 [PID]