Question
Please answer them ALL for me to understand 22. Which of the following describes a weakness in systems and processes that allows a successful attack
Please answer them ALL for me to understand
22. Which of the following describes a weakness in systems and processes that allows a successful attack to occur?
Choice a
Threat
Choice b
Vulnerability
Choice c
Exploit
Choice d
Risk
23. Jason is worried that his staff may be susceptible to releasing information to unauthorized personnel through intimidation, or persuasion. What is the name of this type of attack?
Choice a
Phishing
Choice b
Social engineering
Choice c
Spam
Choice d
24. Which of the following statements about IP addresses is true?
Choice a
Through the use of Network Address Translation (NAT) many devices on the same network can share the same internal IP address
Choice b
All local computers must have an IP address with a subnet mask ending with 255.
Choice c
An IPv4 address has a length of 32 bit
Choice d
The unique identifier for each Network Interface Card (NIC) is based on its assigned IP address
25. What built-in Windows command can be used to help find remote access trojans?
Choice a
Ipconfig displaydns
Choice b
Netdiag
Choice c
Nbtstat -c
Choice d
Netstat -a
26. What service provides encrypted access to UNIX and Windows systems, allowing command-line shell and file transfer access?
Choice a
Telnet
Choice b
FTP
Choice c
WGET
Choice d
SSH
27. Which of the following protocols would be used to guarantee the proper delivery of application data at the transport level?
Choice a
Differentiated Services
Choice b
Transmission Control Protocol (TCP)
Choice c
Internet Protocol (IP)
Choice d
User Datagram Protocol (UDP)
28. What is NOT a reason that Netcat is regularly found on computers that have been infected with a Trojan?
Choice a
Netcat can be used to send or receive files over any port
Choice b
Netcat encrypts all communications
Choice c
Netcat can be used to perform port scanning
Choice d
Netcat can listen on any port and send data to any port
29. Enumeration is also known as ___
Choice a
the process to gather the information about a target machine by actively connecting to it
Choice b
the process to maintain the network access after a breach
Choice c
the process of closing a breach as part of incident response
Choice d
the process to map a target network footprint
30. Which principle determines what resources the user can use on the network?
Choice a
Identification
Choice b
Accountability
Choice c
Authentication
Choice d
Authorization
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started