Which three flags are set Choose three nmap sX hostdomaincom A This is ACK scan

Which three flags are set choose three nmap sx

This preview shows page 19 - 22 out of 46 pages.

An attacker scans a host with the below command. Which three flags are set? (Choose three.) #nmap sX host.domain.com A. This is ACK scan. ACK flag is set B. This is Xmas scan. SYN and ACK flags are set C. This is Xmas scan. URG, PUSH and FIN are set D. This is SYN scan. SYN flag is set Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 40 Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure? A. All of the employees would stop normal work activities B. IT department would be telling employees who the boss is C. Not informing the employees that they are going to be monitored could be an invasion of privacy. D. The network could still experience traffic slow down. Correct Answer: C - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Image of page 19
Section: (none) Explanation Explanation/Reference: QUESTION 41 Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets? A. Internet Key Exchange (IKE) B. Oakley C. IPsec Policy Agent D. IPsec driver Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 42 An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code? A. Wireshark B. Ettercap C. Aircrack-ng D. Tcpdump Correct Answer: B Section: (none) Explanation Explanation/Reference: - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Image of page 20
QUESTION 43 Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is the main theme of the sub-policies for Information Technologies? A. Availability, Non-repudiation, Confidentiality B. Authenticity, Integrity, Non-repudiation C. Confidentiality, Integrity, Availability D. Authenticity, Confidentiality, Integrity Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 44 Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF? A. Omnidirectional antenna B. Dipole antenna C. Yagi antenna D. Parabolic grid antenna Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 45 Why should the security analyst disable/remove unnecessary ISAPI filters?
Image of page 21
Image of page 22

You've reached the end of your free preview.

Want to read all 46 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture