Question
Question 15 How do SYN scans differ from FIN scans in nmap? You may choose more than one answer. SYN scans don't work on Linux
Question 15
How do SYN scans differ from FIN scans in nmap? You may choose more than one answer.
SYN scans don't work on Linux systems. | ||
FIN scans can pass through firewalls. | ||
FIN scans don't work on Windows systems. | ||
Both scans find the same ports. |
10 points
Question 16
AES is only secure when used in Electronic Code Book (ECB) mode.
True
False
10 points
Question 17
Identify which secure design principle is being followed or violated in the following situation. Changing a firewall architecture from a single gateway firewall to a DMZ architecture with two firewalls.
Least Privilege | ||
Fail-Safe Defaults | ||
Economy of Mechanism | ||
Complete Meditation | ||
Open Design | ||
Separation of Privilege | ||
Least Common Mechanism | ||
Psychological Acceptability |
10 points
Question 18
Captive portal security on a wireless network can be bypassed by which of the following techniques.
ARP spoofing | ||
DNS spoofing | ||
IP spoofing | ||
MAC spoofing |
10 points
Question 19
Which of the following techniques can be used to evade detection by a signature-based intrusion detection system? You may choose more than one answer.
Fragmentation of packets | ||
Changing the case of filenames. | ||
URL encoding | ||
Overly long paths with extra ./ sequences |
10 points
Question 20
"Eve performs an FMS WEP cracking attack. Classify this as a violation of confidentiality, integrity, or availability."
Confidentiality | ||
Integrity | ||
Availability |
10 points
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started