Correct Answers | Graded A+ | Verified
Answers | Just Released
Privilege escalation gives the attacker the ability to ________. ---------CORRECT
ANSWER-----------------perform actions on a system with fewer restrictions and
perform tasks that are potentially more damaging
Which of the following is NOT true regarding the use of a packet sniffer? ---------
CORRECT ANSWER-----------------Packet sniffing involves the attacker capturing
traffic from both ends of a communication between two hosts.
Harold is performing a penetration test and would like to force a switch to fall
back to forwarding mode. Which of the following attacks would be most helpful
to Harold in meeting his goal? ---------CORRECT ANSWER-----------------MAC
flooding
What is a type of denial of service (DoS) attack? ---------CORRECT ANSWER-----------
------SYN flood
Which of the following lock types are smart and programmable? ---------CORRECT
ANSWER-----------------Cipher
,The database on the local Windows system that is used to store user account
information is called ________. ---------CORRECT ANSWER-----------------the Security
Account Manager (SAM)
Dhruv is conducting network traffic analysis and is examining a suspicious HTTP
packet using the Wireshark protocol analyzer. He would like to examine the
destination port of the packet. Where in the packet should he look for this
information? ---------CORRECT ANSWER-----------------TCP header
Which of the following is true regarding account passwords? ---------CORRECT
ANSWER-----------------Passwords should have at least one number and one special
character.
Chris is concerned that attackers might engage in sniffing attacks against traffic on
his network. Which of the following protocols is most susceptible to sniffing
attacks? ---------CORRECT ANSWER-----------------Hypertext Transfer Protocol
(HTTP)
Which of the following statements is NOT true regarding oversharing of company
activities? ---------CORRECT ANSWER-----------------Oversharing of company
activities typically is conducted by disgruntled employees who are intentionally
trying to harm their company.
, Which protocol runs on IPv6 networks and provides services similar to Address
Resolution Protocol (ARP)? ---------CORRECT ANSWER-----------------Neighbor
Discovery Protocol (NDP)
An attacker can deprive the system owner of the ability to detect the activities
that have been carried out by ________. ---------CORRECT ANSWER-----------------
disabling auditing
Which of the following is NOT considered a sensible guideline to follow when
using social networking sites? ---------CORRECT ANSWER-----------------Set up an
email account that uses your real name.
Countermeasures that can be used to defeat sniffing include all of the following
except ________. ---------CORRECT ANSWER-----------------Media Access Control
(MAC) flooding
Dhruv is conducting network traffic analysis and is examining a suspicious
network packet using the Wireshark protocol analyzer. He would like to examine
the source Internet Protocol (IP) address of the packet. Where in the packet
should he look for this information? ---------CORRECT ANSWER-----------------IP
header