B.Vulnerabilities in the application layer are greatly different from IPv4C.Due to the extensive security measures it built in IPv 6, application layer vulnerabilities need not beaddressed.D.Implementing IPv4 security in a dual stack network offers protection from IPv6 attacks too.Correct Answer:ASection: (none)ExplanationExplanation/Reference:QUESTION 237An attacker with access to the inside network of a small company launches a successful STP manipulationattack.What will he do next?A.He will activate OSPF on the spoofed root bridgeB.He will repeat the same attack against all L2 switches of the networkC.He will repeat this actions of the escalates to a DoS attackD.He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computerCorrect Answer:DSection: (none)ExplanationExplanation/Reference:QUESTION 238An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router aspart of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?A.Make sure that legitimate network routers are configured to run routing protocols with authentication.B.Redirection of the traffic cannot happen unless the admin allows it explicitly.C.Only using OSPFv3 will mitigate this risk.D.Disable all routing protocols and only use static routesCorrect Answer:ASection: (none)ExplanationExplanation/Reference:QUESTION 239___________ Is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNSdata to reduce the threat of DNS poisoning, spoofing, and similar attacks types.A.Resource recordsB.Zone transferC.Resource transferD. DNSSEC
Correct Answer:DSection: (none)ExplanationExplanation/Reference:QUESTION 240As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to findand verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?A.tcp.port eq 25B.request smtp 25C.smtp portD.tcp.contains port 25Correct Answer:ASection: (none)ExplanationExplanation/Reference:QUESTION 241An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNSserver and NTP server because of the importance of their job. The attacker gain access to the DNS server andredirect the direction to his own IP address. Now when the employees of the office wants togo to Google they are being redirected to the attacker machine. What is the name of this kind of attack?A.DNS spoofingB.ARP PoisoningC.Smurf AttackD.MAC FloodingCorrect Answer:ASection: (none)ExplanationExplanation/Reference:QUESTION 242Jesse receives an email with an attachment labeled "Court_Notice_21206.zip". Inside the zip is a file named"Court_Notice_21206.docx.exe" disguised as a word document. Upon execution, a window appears stating,"This word document is corrupt." In the background, the files copies itself to Jesse APPDATA\local directory
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 115 pages?
Upload your study docs or become a
Course Hero member to access this document