Question
1. QUESTION A TCP SYN flood attack is underway. The attacker has is sending spoofed SYN packets to the victim system. The victim system responds
1.
QUESTION
-
A TCP SYN flood attack is underway. The attacker has is sending spoofed SYN packets to the victim system. The victim system responds to the attacking system, but the attacker doesn't respond. Which of the following describes this attack?
A. DDOS attack
B. Full session
C. Half open
D. Fully open
E. Half closed
-
QUESTION You are concerned that an attacker has accessed one of your Linux systems. What command can you use to examine the log files?
-
A. scan
B. grep
C. locate
D. Notepad
E. find
-
QUESTION 14
-
Which of the following applications is specifically designed for event messages?
A. TCP Syslog
B. TCP SNMP
C. TCP LDAP
D. UDP Syslog
-
QUESTION 10
-
Which rule means that all ports and applications are turned off and only the minimum ones needed to accomplish mission goals are turned on?
A. Implicit Deny all
B. Principle of least privilege
C. Defense in Depth
D. Explicit Deny all
-
QUESTION 6
-
If you are performing a penetration test in which you have a no information on a company, which term best describes the situation?
A. Black Box
B. White Box
C. Gray Box
D. Blind Penetration Test
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started