Join the discussion
Question 1/225
Which of the following statements about service pack are true? Each correct answer represents a complete solution. Choose two.
Correct Answer: C,D
Add Comments
- Other Question (225q)
- Q1. Which of the following statements about service pack are true? Each correct answer represe...
- Q2. You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based net...
- Q3. Place the routing protocols in their appropriate categories....
- Q4. What is the following sequence of packets demonstrating?...
- Q5. Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are tru...
- Q6. If a DNS client wants to look up the IP address for good.news.com and does not receive an ...
- Q7. Use Hashcat to crack a local shadow file. What Is the password for the user account AGains...
- Q8. How can an adversary utilize a stolen database of unsalted password hashes?...
- Q9. Drag and drop the appropriate protocols in front of their descriptions....
- Q10. The TTL can be found in which protocol header?...
- Q11. Which of the following should be implemented to protect an organization from spam?...
- Q12. You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan...
- Q13. Critical information is encrypted within an application accessible only to a small group o...
- Q14. What database can provide contact information for Internet domains?...
- Q15. Which of the following are used to suppress gasoline and oil fires? Each correct answer re...
- Q16. With regard to defense-in-depth, which of the following statements about network design pr...
- Q17. What is needed for any of the four options for Azure AD multi-factor user authentication?...
- Q18. Which of the following protocols is used to send e-mails on the Internet?...
- Q19. A folder D:\Files\Marketing has the following NTFS permissions: * Administrators: Full Con...
- Q20. What is it called when an OSI layer adds a new header to a packet?...
- Q21. What is the purpose of a TTL value?
- Q22. In the AGULP model, who should be assigned permissions and privileges?...
- Q23. Validating which vulnerabilities in a network environment are able to be exploited by an a...
- Q24. Two clients connecting from the same public IP address (for example - behind the same NAT ...
- Q25. Which of the following is the key point to consider in the recovery phase of incident hand...
- Q26. Jonny Is an IT Project Manager. He cannot access the folder called "IT Projects" but can a...
- Q27. What type of malware is a self-contained program that has the ability to copy itself witho...
- Q28. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-b...
- Q29. You are responsible for a Microsoft based network. Your servers are all clustered. Which o...
- Q30. Which of the following is a benefit to utilizing Cygwin for Windows?...
- Q31. What improvement could a company that is rated at a NIST Implementation Tier of 2: Risk In...
- Q32. Which of the following protocols provides maintenance and error reporting function?...
- Q33. You ask your system administrator to verify user compliance with the corporate policies on...
- Q34. There is not universal agreement on the names of the layers in the TCP/IP networking model...
- Q35. Your customer is using Windows XP Service pack 1 with wireless zero configuration. Which i...
- Q36. What does an attacker need to consider when attempting an IP spoofing attack that relies o...
- Q37. Which of the following monitors program activities and modifies malicious activities on a ...
- Q38. Which of the following statements would describe the term "incident" when used in the bran...
- Q39. Which of the following is a backup strategy?
- Q40. A US case involving malicious code is brought to trial. An employee had opened a helpdesk ...
- Q41. What Windows log should be checked to troubleshoot a Windows service that is falling to st...
- Q42. What is the key difference between Electronic Codebook mode and other block cipher modes l...
- Q43. Which of the following applications cannot proactively detect anomalies related to a compu...
- Q44. Your organization has broken its network into several sections/segments, which are separat...
- Q45. An employee is currently logged into the corporate web server, without permission. You log...
- Q46. Which of the following statements about the authentication concept of information security...
- Q47. Which choice best describes the line below? alert tcp any any -> 192.168.1.0/24 80 (con...
- Q48. If Linux server software is a requirement in your production environment which of the foll...
- Q49. Which of the following is required to be backed up on a domain controller to recover Activ...
- Q50. You have implemented a firewall on the company's network for blocking unauthorized network...
- Q51. Which of the following statements about Network Address Translation (NAT) are true? Each c...
- Q52. Which class of IDS events occur when the IDS fails to alert on malicious data?...
- Q53. You are examining a packet capture session in Wire shark and see the packet shown in the a...
- Q54. Why are false positives such a problem with IPS technology?...
- Q55. Which of the following applications cannot proactively detect anomalies related to a compu...
- Q56. Your organization has broken its network into several sections/segments, which are separat...
- Q57. Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?...
- Q58. Use PowerShell ISE to examineC:\Windows\security\templates\WorkstationSecureTemplate.inf. ...
- Q59. What could be used to mitigate hash collisions?...
- Q60. Which of the following commands is used to change file access permissions in Linux?...
- Q61. Which of the following utilities provides an efficient way to give specific users permissi...
- Q62. A guard in a company is checking and locking a door left unblocked by a careless employee....
- Q63. You are an Intrusion Detection Analyst and the system has alerted you to an Event of Inter...
- Q64. An organization monitors the hard disks of its employees' computers from time to time. Whi...
- Q65. Which of the following commands is used to convert password entries in the /etc/passwd fil...
- Q66. Which layer of the TCP/IP Protocol Stack Is responsible for port numbers?...
- Q67. When considering ingress filtering, why should all inbound packets be dropped if they cont...
- Q68. Which of the following SHELL commands displays currently logged-in users and their tasks?...
- Q69. Which of the following protocols describes the operation of security In H.323?...
- Q70. When designing wireless networks, one strategy to consider is implementing security mechan...
- Q71. Which Authenticates Assurance Level requires a hardware-based authenticates?...
- Q72. Which of the following ports is used by the Secure File Transfer Protocol (SFTP)?...
- Q73. During which of the following steps is the public/private key-pair generated for Public Ke...
- Q74. You work as a Network Administrator for Perfect World Inc. You are configuring a network t...
- Q75. What technique makes it difficult for attackers to predict the memory address space locati...
- Q76. Which of the following books deals with confidentiality?...
- Q77. Which of the following can be done over telephone lines, e-mail, instant messaging, and an...
- Q78. An IT security manager is trying to quickly assess the risks associated with not implement...
- Q79. When are Group Policy Objects (GPOs) NOT applied automatically to workstations?...
- Q80. An employee is currently logged into the corporate web server, without permission. You log...
- Q81.
- Q82. In PKI, when someone wants to verify that the certificate is valid, what do they use to de...
- Q83. How often is session information sent to the web server from the browser once the session ...
- Q84. Which of the following statements about Network Address Translation (NAT) are true? Each c...
- Q85. Which of the following utilities is used to verify the existence of a host in a network?...
- Q86. Which of the following is a backup strategy?
- Q87. Which of the following protocols work at the Session layer of the OSI model? Each correct ...
- Q88. Which of the following is a name, symbol, or slogan with which a product is identified?...
- Q89. With regard to defense-in-depth, which of the following statements about network design pr...
- Q90. Which of the following statements would be seen in a Disaster Recovery Plan?...
- Q91. Which of the following is a type of countermeasure that can be deployed to ensure that a t...
- Q92. Which of the following statements best describes where a border router is normally placed?...
- Q93. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based ne...
- Q94. If a DNS client wants to look up the IP address for good.news.com and does not receive an ...
- Q95. Which of the following elements is the most important requirement to ensuring the success ...
- Q96. Which of the following is a potential WPA3 security issue?...
- Q97. Which of the following terms is used for the process of securing a system or a device on a...
- Q98. What cryptographic technique does file Integrity monitoring employ?...
- Q99. A new data center is being built where customer credit information will be processed and s...
- Q100. Which of the following books is used to examine integrity and availability?...
- Q101. When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created...
- Q102. If an attacker compromised a host on a site's internal network and wanted to trick other m...
- Q103. Which of the following are the types of access controls? Each correct answer represents a ...
- Q104. Which of the following access control principles helps prevent collusion and detect abuse ...
- Q105. A program has allocated 10 characters of space for user's response on a form. The applicat...
- Q106. Which of the following is NOT a recommended best practice for securing Terminal Services a...
- Q107. What are the benefits of using a proxy server on a network? Each correct answer represents...
- Q108. Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are tru...
- Q109. In addition to securing the operating system of production honey pot hosts, what is recomm...
- Q110. What requirement must an administrator remember when utilizing Security Configuration and ...
- Q111. What type of attack can be performed against a wireless network using the tool Kismet?...
- Q112. Your system has been infected by malware. Upon investigation, you discover that the malwar...
- Q113. Which of the following protocols is responsible for the resolution of IP addresses to medi...
- Q114. Which of the following Microsoft services integrates SSO into Microsoft 365 by syncing wit...
- Q115. At what point in the Incident Handling process should an organization determine its approa...
- Q116. Which of the following is a signature-based intrusion detection system (IDS) ?...
- Q117. Which of the following is a process of monitoring data packets that travel across a networ...
- Q118. In an Active Directory domain, which is the preferred method of keeping host computers pat...
- Q119. The Linux command to make the /etc/shadow file, already owned by root, readable only by ro...
- Q120. In which of the following does a Web site store information such as user preferences to pr...
- Q121. Which of the following quantifies the effects of a potential disaster over a period of tim...
- Q122. An attacker gained physical access to an internal computer to access company proprietary d...
- Q123. When trace route fails to get a timely response for a packet after three tries, which acti...
- Q124. Your customer wants wireless internet in his home. He must have speeds of at least 100 mbp...
- Q125. What is the motivation behind SYN/FIN scanning?...
- Q126. Which of the following is the default port for Simple Network Management Protocol (SNMP)?...
- Q127. Two clients connecting from the same public IP address (for example - behind the same NAT ...
- Q128. Which of the following tools is also capable of static packet filtering?...
- Q129. Which of the following are used to suppress gasoline and oil fires? Each correct answer re...
- Q130. You work as a Network Administrator for Secure World Inc. The company has a Linux-based ne...
- Q131. What is the process of simultaneously installing an operating system and a Service Pack ca...
- Q132. Which of the following is a new Windows Server 2008 feature for the Remote Desktop Protoco...
- Q133. You work as a Network Administrator for McRobert Inc. The company has a TCP/IP-based netwo...
- Q134. What file instructs programs like Web spiders NOT to search certain areas of a site?...
- Q135. You work as a Network Administrator for Net World Inc. The company has a Linux-based netwo...
- Q136. Which of the following files is used to control the behavior of the SSH server?...
- Q137. Which command would allow an administrator to determine if a RPM package was already insta...
- Q138. How many clients Is a single WSUS server designed to support when the minimum system requi...
- Q139. Why would someone use port 80 for deployment of unauthorized services?...
- Q140. Many IIS servers connect to Microsoft SQL databases. Which of the following statements abo...
- Q141. What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?...
- Q142. Which of the following TCP packet flags indicates that host should IMMEDIATELY terminate t...
- Q143. Training an organization on possible phishing attacks would be included under which NIST F...
- Q144. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-b...
- Q145. Which of the following monitors program activities and modifies malicious activities on a ...
- Q146. The Linux command to make the /etc/shadow file, already owned by root, readable only by ro...
- Q147. You work as an Administrator for McNeil Inc. The company has a Linux-based network. You ar...
- Q148. Which of the following statements about Microsoft's VPN client software is FALSE?...
- Q149. Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap. What ...
- Q150. Fill in the blank with the correct answer to complete the statement below. The permission ...
- Q151. Which of the following is more commonly used for establishing high-speed backbones that in...
- Q152. What is the fundamental problem with managing computers in stand-alone Windows workgroups?...
- Q153. What method do Unix-type systems use to prevent attackers from cracking passwords using pr...
- Q154. You work as a system administrator for Tech Perfect Inc. The company has a Linux-based net...
- Q155. Which of the following are the ways of sending secure e-mail messages over the Internet? E...
- Q156. Which of the following Linux commands can change both the username and group name a file b...
- Q157. During a scheduled evacuation training session the following events took place in this ord...
- Q158. There is not universal agreement on the names of the layers in the TCP/IP networking model...
- Q159. You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan...
- Q160. Which common firewall feature can be utilized to generate a forensic trail of evidence and...
- Q161. When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created...
- Q162. Which of the following focuses on identifying weaknesses within the current system?...
- Q163. Which of the following statements best describes where a border router is normally placed?...
- Q164. You have been hired to design a TCP/IP-based network that will contain both Unix and Windo...
- Q165. What is the term for a game in which for every win there must be an equivalent loss?...
- Q166. You work as a Network Administrator for Secure World Inc. The company has a Linux-based ne...
- Q167. A system administrator sees the following URL in the webserver logs: (Exhibit) Which actio...
- Q168. Which of the following statements about policy is FALSE?...
- Q169. Analyze the following screenshot. What conclusion can be drawn about the user account show...
- Q170. Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 doma...
- Q171. You are the security director for an off-shore banking site. From a business perspective, ...
- Q172. What does it mean if a protocol such as HTTP is stateless?...
- Q173. Which of the following is TRUE regarding Ethernet?...
- Q174. Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? ...
- Q175. Which attack stage mirrors the Information Gathering phase used in penetration testing met...
- Q176. Which of the following best describes the level of risk associated with using proprietary ...
- Q177. You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 i...
- Q178. Which of the following commands can you use to create an ext3 file system? Each correct an...
- Q179. The process of enumerating all hosts on a network defines which of the following activitie...
- Q180. You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network...
- Q181. Which of the following types of computers is used for attracting potential intruders?...
- Q182. Which of the following statements about a bastion host is true?...
- Q183. Which of the following terms refers to manual assignment of IP addresses to computers and ...
- Q184. Which of the following tasks is the responsibility of a Linux systems administrator who is...
- Q185. You work as a Network Administrator for Net World Inc. The company has a Linux-based netwo...
- Q186. Which of the following are examples of Issue-Specific policies all organizations should ad...
- Q187. A database is accessed through an application that users must authenticate with, on a host...
- Q188. Two clients connecting from the same public IP address (for example - behind the same NAT ...
- Q189. Which of the following prevents malicious programs from attacking a system?...
- Q190. Which of the following is referred to as Electromagnetic Interference (EMI)?...
- Q191. Which of the following ports is used by Kerberos?...
- Q192. Which of the following statements are true about satellite broadband Internet access? Each...
- Q193. Which of the following commands is used to switch from one user login to another in a Linu...
- Q194. You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 i...
- Q195. What does Authentication Header (AH) add to the packet in order to prevent an attacker fro...
- Q196. Which of the following services does Internet Information Server (IIS) provide along with ...
- Q197. Which practice can help protect secrets in a cloud environment?...
- Q198. Which of the following is a security threat if included in the search path of a computer?...
- Q199. What are the two actions the receiver of a PGP email message can perform that allows estab...
- Q200. In a /24 subnet, which of the following is a valid broadcast address?...
- Q201. The Windows 'tracert' begins by sending what type of packet to the destination host?...
- Q202. Which of the following areas of a network contains DNS servers and Web servers for Interne...
- Q203. Which of the following protocols is used to retrieve e-mails from a remote mail server?...
- Q204. You are implementing wireless access at a defense contractor. Specifications say, you must...
- Q205. Which of the following SIP methods is used to setup a new session and add a caller?...
- Q206. Which of the following is a standard Unix command that would most likely be used to copy r...
- Q207. You have an automated system for patching the operating systems of all your computers. All...
- Q208. A US case involving malicious code is brought to trial. An employee had opened a helpdesk ...
- Q209. Which of the following is an advantage of private circuits versus VPNs?...
- Q210.
- Q211. In order to capture traffic for analysis, Network Intrusion Detection Systems (NIDS) opera...
- Q212. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-b...
- Q213. When considering ingress filtering, why should all inbound packets be dropped if they cont...
- Q214. Which of the following classes of fire comes under Class C fire?...
- Q215. You work as a Network Administrator for McNeil Inc. The company has a Linux-based network....
- Q216. Which of the following is a benefit to utilizing Cygwin for Windows?...
- Q217. Which of the following utilities can be used to manage the Windows Firewall (WF) from the ...
- Q218. What is the name of the command-line tool for Windows that can be used to manage audit pol...
- Q219. You are examining an IP packet with a header of 40 bytes in length and the value at byte 0...
- Q220. What is the unnoticed theft of sensitive data from a laptop owned by an organization's CEO...
- Q221. What is a characteristic of iOS security?
- Q222. Many IIS servers connect to Microsoft SQL databases. Which of the following statements abo...
- Q223. An employee attempting to use your wireless portal reports receiving the error shown below...
- Q224. You have set up a local area network for your company. Your firewall separates your networ...
- Q225. While using Wire shark to investigate complaints of users being unable to login to a web a...
