What is the motivation behind SYN/FIN scanning?
A. The SYN/FIN combination is useful for signaling to certain Trojans.
B. SYN/FIN packets are commonly used to launch denial of service attacks against BSD hosts.
C. The crafted SYN/FIN packet sometimes gets past firewalls and filtering routers.
D. A SYN/FIN packet is used in session hijacking to take over a session.
Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?
A. The server is not using a well-known port.
B. The server is on a different network.
C. The client-side source ports are different.
D. The clients are on different subnets.
Which of the following is a standard Unix command that would most likely be used to copy raw file system data for later forensic analysis?
A. dd
B. backup
C. cp
D. gzip
Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.
This style of defense-in-depth protection is best described as which of the following?
A. Uniform protection
B. Threat-oriented
C. Information-centric
D. Protected enclaves
If a DNS client wants to look up the IP address for good.news.com and does not receive an authoritative reply from its local DNS server, which name server is most likely to provide an authoritative reply?
A. The news.com domain name server
B. The .com (top-level) domain name server
C. The .(root-level) domain name server
D. The .gov (top-level) domain name server
If you do NOT have an original file to compare to, what is a good way to identify steganography in potential carrier files?
A. Determine normal properties through methods like statistics and look for changes
B. Determine normal network traffic patterns and look for changes
C. Find files with the extension .stg
D. Visually verify the files you suspect to be steganography messages
What is the maximum number of connections a normal Bluetooth device can handle at one time?
A. 2
B. 4
C. 1
D. 8
E. 7
Which of the following statements about the authentication concept of information security management is true?
A. It ensures the reliable and timely access to resources.
B. It ensures that modifications are not made to data by unauthorized personnel or processes.
C. It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.
D. It establishes the users' identity and ensures that the users are who they say they are.
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
A. Privacy policy
B. Backup policy
C. User password policy
D. Network security policy
You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?
A. ls
B. chroot
C. route
D. chdir