Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer them ALL for me to understand 22. Which of the following describes a weakness in systems and processes that allows a successful attack

Please answer them ALL for me to understand

22. Which of the following describes a weakness in systems and processes that allows a successful attack to occur?

Choice a

Threat

Choice b

Vulnerability

Choice c

Exploit

Choice d

Risk

23. Jason is worried that his staff may be susceptible to releasing information to unauthorized personnel through intimidation, or persuasion. What is the name of this type of attack?

Choice a

Phishing

Choice b

Social engineering

Choice c

Spam

Choice d

24. Which of the following statements about IP addresses is true?

Choice a

Through the use of Network Address Translation (NAT) many devices on the same network can share the same internal IP address

Choice b

All local computers must have an IP address with a subnet mask ending with 255.

Choice c

An IPv4 address has a length of 32 bit

Choice d

The unique identifier for each Network Interface Card (NIC) is based on its assigned IP address

25. What built-in Windows command can be used to help find remote access trojans?

Choice a

Ipconfig displaydns

Choice b

Netdiag

Choice c

Nbtstat -c

Choice d

Netstat -a

26. What service provides encrypted access to UNIX and Windows systems, allowing command-line shell and file transfer access?

Choice a

Telnet

Choice b

FTP

Choice c

WGET

Choice d

SSH

27. Which of the following protocols would be used to guarantee the proper delivery of application data at the transport level?

Choice a

Differentiated Services

Choice b

Transmission Control Protocol (TCP)

Choice c

Internet Protocol (IP)

Choice d

User Datagram Protocol (UDP)

28. What is NOT a reason that Netcat is regularly found on computers that have been infected with a Trojan?

Choice a

Netcat can be used to send or receive files over any port

Choice b

Netcat encrypts all communications

Choice c

Netcat can be used to perform port scanning

Choice d

Netcat can listen on any port and send data to any port

29. Enumeration is also known as ___

Choice a

the process to gather the information about a target machine by actively connecting to it

Choice b

the process to maintain the network access after a breach

Choice c

the process of closing a breach as part of incident response

Choice d

the process to map a target network footprint

30. Which principle determines what resources the user can use on the network?

Choice a

Identification

Choice b

Accountability

Choice c

Authentication

Choice d

Authorization

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Microsoft SQL Server 2014 Integration Services

Authors: Brian Knight, Devin Knight

1st Edition

1118850904, 9781118850909

More Books

Students also viewed these Databases questions

Question

1. Explain why evaluation is important.

Answered: 1 week ago