Podcast
Questions and Answers
When performing a DNS lookup of www.google.com from a remote network, which server is likely to provide an Authoritative reply?
When performing a DNS lookup of www.google.com from a remote network, which server is likely to provide an Authoritative reply?
- The top-level DNS server for.com
- The DNS server for google.com
- The local DNS server (correct)
- The root DNS server
What is the most appropriate preventative measure for a packet capture file that contains a long series of 'no operation' (NOP) commands and a malicious payload?
What is the most appropriate preventative measure for a packet capture file that contains a long series of 'no operation' (NOP) commands and a malicious payload?
- Restrictions on file permissions
- Controls against time of check/time of use attacks (correct)
- Limits on the number of failed logins
- Boundary checks on program inputs
When should the initial database for a Linux file integrity checker be created?
When should the initial database for a Linux file integrity checker be created?
- Before a system is patched
- Before a system has been compromised (correct)
- After a system has been compromised
- During an attack
What is the term used to describe the validation of vulnerabilities in a network environment that are able to be exploited by an attacker?
What is the term used to describe the validation of vulnerabilities in a network environment that are able to be exploited by an attacker?
In Incident Handling, which statements describe the term 'incident'?
In Incident Handling, which statements describe the term 'incident'?
Which SIP method is used to setup a new session and add a caller?
Which SIP method is used to setup a new session and add a caller?
How would the alert for activity generated by a worm, with normal network traffic, be categorized?
How would the alert for activity generated by a worm, with normal network traffic, be categorized?
For what aspect of UNIX systems was process accounting originally developed?
For what aspect of UNIX systems was process accounting originally developed?
What do 'In-line NIDS' devices use to identify malicious events on the network?
What do 'In-line NIDS' devices use to identify malicious events on the network?
What is the registry key used to manage remote registry share permissions for the whole registry?
What is the registry key used to manage remote registry share permissions for the whole registry?
Which layer of the TCP/IP Protocol Stack is responsible for port numbers?
Which layer of the TCP/IP Protocol Stack is responsible for port numbers?
What is the primary purpose of in-line NIDS devices in network security?
What is the primary purpose of in-line NIDS devices in network security?
What is the term used to describe the process of validating vulnerabilities in a network environment that are exploitable by an attacker?
What is the term used to describe the process of validating vulnerabilities in a network environment that are exploitable by an attacker?
Which layer of the TCP/IP Protocol Stack is responsible for assigning port numbers?
Which layer of the TCP/IP Protocol Stack is responsible for assigning port numbers?
Flashcards are hidden until you start studying