100%(3)3 out of 3 people found this document helpful
This preview shows page 19 - 22 out of 46 pages.
An attacker scans a host with the below command. Which three flags are set? (Choose three.) #nmap –sX host.domain.comA. This is ACK scan. ACK flag is set B. This is Xmas scan. SYN and ACK flags are set C. This is Xmas scan. URG, PUSH and FIN are set D. This is SYN scan. SYN flag is set Correct Answer: C Section: (none) ExplanationExplanation/Reference:QUESTION 40Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure? A. All of the employees would stop normal work activities B. IT department would be telling employees who the boss is C. Not informing the employees that they are going to be monitored could be an invasion of privacy. D. The network could still experience traffic slow down. Correct Answer: C - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none) ExplanationExplanation/Reference:QUESTION 41Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets? A. Internet Key Exchange (IKE) B. Oakley C. IPsec Policy Agent D. IPsec driver Correct Answer: A Section: (none) ExplanationExplanation/Reference:QUESTION 42An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code? A. Wireshark B. Ettercap C. Aircrack-ng D. Tcpdump Correct Answer: B Section: (none) ExplanationExplanation/Reference:- VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 43Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is the main theme of the sub-policies for Information Technologies? A. Availability, Non-repudiation, Confidentiality B. Authenticity, Integrity, Non-repudiation C. Confidentiality, Integrity, Availability D. Authenticity, Confidentiality, Integrity Correct Answer: C Section: (none) ExplanationExplanation/Reference:QUESTION 44Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF? A. Omnidirectional antenna B. Dipole antenna C. Yagi antenna D. Parabolic grid antenna Correct Answer: C Section: (none) ExplanationExplanation/Reference:QUESTION 45Why should the security analyst disable/remove unnecessary ISAPI filters?