Topic 1: Exam Pool A
One of your team members has asked you to analyze the following SOA record. What is
the version?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800
2400.) (Choose four.)
A.
200303028
B.
3600
C.
604800
D.
2400
E.
60
F.
4800
200303028
Which of the following tools can be used for passive OS fingerprinting?
A.
nmap
B.
tcpdump
C.
tracert
D.
ping
tcpdump
Why is a penetration test considered to be more thorough than vulnerability scan?
A.
Vulnerability scans only do host discovery and port scanning by default.
B.
A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a
vulnerability scan does not typically involve active exploitation.
C.
It is not – a penetration test is often performed by an automated tool, while a
vulnerability scan requires active engagement.
D.
The tools used by penetration testers tend to have much more comprehensive
vulnerability databases.
A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a
vulnerability scan does not typically involve active exploitation.
Which definition among those given below best describes a covert channel?
A.
A server program using a port that is not well known.
B.
Making use of a protocol in a way it is not intended to be used.
C.
It is the multiplexing taking place on a communication link.
D.
It is one of the weak channels used by WEP which makes it insecure
Making use of a protocol in a way it is not intended to be used.
The configuration allows a wired or wireless network interface controller to pass all traffic it
receives to the Central Processing Unit (CPU), rather than passing only the frames that the
controller is intended to receive. Which of the following is being described?
A.
Multi-cast mode
B.
Promiscuous mode
C.
WEM
D.
Port forwarding
Promiscuous mode
Page 28 out of 114 Pages |
Previous |