Why can remote access VPNs not use Main Mode for IKE Phase-1 if the authentication method
is pre-shared key? - Answers Pre-shared key authentication with Main Mode requires that the
peer's IP is known before the connection is established.
What is the blocksize of the DES encryption cipher? - Answers 64 bits
What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast
Which is the least secure encryption cipher of those listed below? - Answers DES
Which file in a user's home directory controls the trust relationships for Berkeley R services? -
Answers .rhosts
Why can remote access servers not use aggressive mode for IKE Phase-1 if the authentication
method is pre-shared key? - Answers Because pre-shared key authentication with aggressive
mode does not provide identity protection.
What is the key length of the AES encryption cipher? - Answers 128 bits
What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast
Which is the most secure encryption cipher of those listed below? - Answers AES
Which file in a user's home directory controls the trust relationships for SSH? - Answers
.ssh/authorized_keys
Why can remote access VPNs not use aggressive mode for IKE Phase-1 if the authentication
method is pre-shared key? - Answers Because pre-shared key authentication with aggressive
mode does not provide identity protection.
What is the key length of the Triple-DES encryption cipher? - Answers 168 bits
What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast
Which is the most secure encryption cipher of those listed below? - Answers AES
Which file in a user's home directory controls the trust relationships for FTP? - Answers .netrc
Why can remote access servers not use Main Mode for IKE Phase-1 if the authentication
,method is pre-shared key? - Answers Because pre-shared key authentication with Main Mode
requires that the peer's IP is known before the connection is established.
What is the key length of the IDEA encryption cipher? - Answers 128 bits
What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast
Which is the least secure encryption cipher of those listed below? - Answers DES
Which file in a user's home directory controls the trust relationships for NFS? - Answers .rhosts
Which operating system is most likely to be vulnerable to the TTYPROMPT vulnerability in the
telnet service? - Answers Solaris 8
What algorithm can be used to negotiate a shared encryption key? - Answers Diffie-Hellman
Which protocols are associated with PPTP? - Answers TCP port 1723 and IP protocol 47
Where are the encrypted passwords stored on a Solaris system? - Answers /etc/shadow
What is the purpose of the rwho protocol? - Answers To send regular broadcasts and listen to
broadcasts from other systems.
How do rwho clients query the rwho daemon? - Answers Using UDP port 513.
How do rwho clients query the rwho daemon using ONC/RPC? - Answers They can't.
How do you establish a null session to a Windows host from a Windows command shell? -
Answers NET USE \\hostname\ipc$ "" /u:""
What is the purpose of the NET USE command in establishing a null session? - Answers To
connect to a shared resource on a remote host.
What is the purpose of the \\hostname\ipc$ argument in the NET USE command? - Answers To
specify the IPC$ share on the remote host.
What is the purpose of the /u:"" argument in the NET USE command? - Answers To specify a null
username.
What is the purpose of the account lockout threshold? - Answers To determine the number of
incorrect password attempts before an account is locked out.
How many incorrect password attempts will cause the built-in administrator account to be
locked out on a Windows 2003 system? - Answers The built-in administrator account will never
be locked out.
, What is the purpose of the account lockout duration setting? - Answers To determine the
duration of an account lockout.
What is the purpose of the NET USE command in establishing a null session? - Answers To
connect to a shared resource on a remote host.
What is the purpose of the \\hostname\c$ argument in the NET USE command? - Answers To
specify the C$ share on the remote host.
What is the purpose of the /u:NULL argument in the NET USE command? - Answers There is no
such argument in the NET USE command.
What is the purpose of the /u:"" argument in the NET USE command? - Answers To specify a null
username.
What is the purpose of the account lockout threshold? - Answers To determine the number of
incorrect password attempts before an account is locked out.
How many incorrect password attempts will cause the built-in administrator account to be
locked out on a Windows 2003 system? - Answers The built-in administrator account will never
be locked out.
What is the purpose of the account lockout duration setting? - Answers To determine the
duration of an account lockout.
What effect would an octal umask of 0027 have on the permissions of new files? - Answers
Remove group write access, and remove all permissions for others.
What is the name given to the field concerned with the security implications of electronic
eminations from communications equipment? - Answers TEMPEST
Which of these is not a valid IPv6 address? - Answers 2001:0db8:1428:57ab
You discover an Internet accessible anonymous FTP server on a client's internal network, which
is vulnerable to the FTP bounce attack. What is the impact of this vulnerability? - Answers
Attackers could exploit the vulnerability to port scan other systems on the client's internal
network.
What is the purpose of an octal umask? - Answers To set default permissions for newly created
files.
What are the three basic permissions in Unix-like systems? - Answers Read, write, and execute.
What is the octal representation of the permission 'rwxr-xr--'? - Answers 754
What is the octal representation of the permission 'rw-rw-r--'? - Answers 664