Topic 1: Exam Pool A
Which of the following is considered as one of the most reliable forms of TCP scanning?
A.
TCP Connect/Full Open Scan
B.
Half-open Scan
C.
NULL Scan
D.
Xmas Scan
TCP Connect/Full Open Scan
You are attempting to run an Nmap port scan on a web server. Which of the following
commands would result in a scan of common ports with the least amount of noise in order
to evade IDS?
A.
nmap –A - Pn
B.
nmap –sP –p-65535-T5
C.
nmap –sT –O –T0
D.
nmap –A --host-timeout 99-T1
nmap –sT –O –T0
Bob, a network administrator at BigUniversity, realized that some students are connecting
their notebooks in the wired network to have Internet access. In the university campus,
there are many Ethernet ports available for professors and authorized visitors but not for
students.
He identified this when the IDS alerted for malware activities in the network.
What should Bob do to avoid this problem?
A.
Disable unused ports in the switches
B.
Separate students in a different VLAN
C.
Use the 802.1x protocol
D.
Ask students to use the wireless network
Use the 802.1x protocol
Which of the following program infects the system boot sector and the executable files at
the same time?
A.
Stealth virus
B.
Polymorphic virus
C.
Macro virus
D.
Multipartite Virus
Multipartite Virus
Cross-site request forgery involves:
A.
A request sent by a malicious user from a browser to a server
B.
Modification of a request by a proxy between client and server
C.
A browser making a request to a server without the user’s knowledge
D.
A server making a request to another server without the user’s knowledge
A browser making a request to a server without the user’s knowledge
Page 6 out of 147 Pages |
Previous |