A burp suite b openvas c tshark d kismet correct

  • No School
  • AA 1
  • a58584458
  • 156
  • 100% (2) 2 out of 2 people found this document helpful

This preview shows page 101 - 107 out of 156 pages.

A. Burp Suite B. OpenVAS C. tshark D. Kismet Correct Answer: D Section: MIX QUESTIONS ExplanationExplanation/Reference:QUESTION 209The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation? - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. A. RST B. ACK C. SYN-ACK D. SYN Correct Answer: D Section: MIX QUESTIONSExplanation- VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Explanation/Reference:QUESTION 210Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except. A. Protect the payload and the headers B. Authenticate C. Encrypt D. Work at the Data Link Layer Correct Answer: D Section: MIX QUESTIONS ExplanationExplanation/Reference:QUESTION 211Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system? A. A biometric system that bases authentication decisions on behavioral attributes. B. A biometric system that bases authentication decisions on physical attributes. C. An authentication system that creates one-time passwords that are encrypted with secret keys. D. An authentication system that uses passphrases that are converted into virtual passwords. Correct Answer: C Section: MIX QUESTIONS ExplanationExplanation/Reference:QUESTION 212- VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack? Only using OSPFv3 will mitigate this risk. B. Make sure that legitimate network routers are configured to run routing protocols with authentication. C. Redirection of the traffic cannot happen unless the admin allows it explicitly. D. Disable all routing protocols and only use static routes. Correct Answer: B Section: MIX QUESTIONS ExplanationExplanation/Reference:QUESTION 213Look at the following output. What did the hacker accomplish? - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. The hacker used whois to gather publicly available records for the domain. B. The hacker used the "fierce" tool to brute force the list of available domains. C. The hacker listed DNS records on his own domain. D. The hacker successfully transfered the zone and enumerated the hosts. - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: D Section: MIX QUESTIONS ExplanationExplanation/Reference:QUESTION 214

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture