Question: 1. QUESTION A TCP SYN flood attack is underway. The attacker has is sending spoofed SYN packets to the victim system. The victim system responds
1.
QUESTION
-
A TCP SYN flood attack is underway. The attacker has is sending spoofed SYN packets to the victim system. The victim system responds to the attacking system, but the attacker doesn't respond. Which of the following describes this attack?
A. DDOS attack
B. Full session
C. Half open
D. Fully open
E. Half closed
-
QUESTION You are concerned that an attacker has accessed one of your Linux systems. What command can you use to examine the log files?
-
A. scan
B. grep
C. locate
D. Notepad
E. find
-
QUESTION 14
-
Which of the following applications is specifically designed for event messages?
A. TCP Syslog
B. TCP SNMP
C. TCP LDAP
D. UDP Syslog
-
QUESTION 10
-
Which rule means that all ports and applications are turned off and only the minimum ones needed to accomplish mission goals are turned on?
A. Implicit Deny all
B. Principle of least privilege
C. Defense in Depth
D. Explicit Deny all
-
QUESTION 6
-
If you are performing a penetration test in which you have a no information on a company, which term best describes the situation?
A. Black Box
B. White Box
C. Gray Box
D. Blind Penetration Test
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
