Which of the following is the reason of using Faraday cage?
A. To prevent Denial-of-Service (DoS) attack
B. To prevent shoulder surfing
C. To prevent mail bombing
D. To prevent data emanation
The Windows 'tracert' begins by sending what type of packet to the destination host?
A. A UDP packet with a TTL of 1
B. An ICMP Echo Request
C. An ICMP Router Discovery
D. An ICMP Echo Reply
Which of the following Linux commands can change both the username and group name a file belongs to?
A. chown
B. chgrp
C. chmod
D. newgrp
Which of the following quantifies the effects of a potential disaster over a period of time?
A. Risk Assessment
B. Business Impact Analysis
C. Disaster Recovery Planning
D. Lessons Learned
When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?
A. TCP Sequence Number
B. Source address
C. Destination port
D. Destination address
Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?
A. Eavesdropping attacks cannot be performed through concrete walls.
B. Eavesdropping attacks can take place from miles away.
C. Eavesdropping attacks are easily detected on wireless networks.
D. Eavesdropping attacks require expensive devices.
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?
A. Take a full backup daily with the previous night's tape taken offsite.
B. Take a full backup daily and use six-tape rotation.
C. Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.
D. Take a full backup on alternate days and keep rotating the tapes.
E. Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.
F. Take a full backup daily with one tape taken offsite weekly.
Which of the following attacks can be mitigated by avoiding making system calls from within a web application? Choose two
A. Denial of Service
B. OS command injection
C. SQL Injection
D. Buffer Overflows
The TTL can be found in which protocol header?
A. It is found in byte 8 of the ICMP header.
B. It is found in byte 8 of the IP header.
C. It is found in byte 8 of the TCP header.
D. It is found in byte 8 of the DNS header.
What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?
A. These attacks work against relatively idle servers.
B. These attacks rely on a modified TCP/IP stack to function.
C. These attacks can be easily traced back to the source.
D. These attacks only work against Linux/Unix hosts.