Question: Please answer them ALL for me to understand 22. Which of the following describes a weakness in systems and processes that allows a successful attack

Please answer them ALL for me to understand

22. Which of the following describes a weakness in systems and processes that allows a successful attack to occur?

Choice a

Threat

Choice b

Vulnerability

Choice c

Exploit

Choice d

Risk

23. Jason is worried that his staff may be susceptible to releasing information to unauthorized personnel through intimidation, or persuasion. What is the name of this type of attack?

Choice a

Phishing

Choice b

Social engineering

Choice c

Spam

Choice d

24. Which of the following statements about IP addresses is true?

Choice a

Through the use of Network Address Translation (NAT) many devices on the same network can share the same internal IP address

Choice b

All local computers must have an IP address with a subnet mask ending with 255.

Choice c

An IPv4 address has a length of 32 bit

Choice d

The unique identifier for each Network Interface Card (NIC) is based on its assigned IP address

25. What built-in Windows command can be used to help find remote access trojans?

Choice a

Ipconfig displaydns

Choice b

Netdiag

Choice c

Nbtstat -c

Choice d

Netstat -a

26. What service provides encrypted access to UNIX and Windows systems, allowing command-line shell and file transfer access?

Choice a

Telnet

Choice b

FTP

Choice c

WGET

Choice d

SSH

27. Which of the following protocols would be used to guarantee the proper delivery of application data at the transport level?

Choice a

Differentiated Services

Choice b

Transmission Control Protocol (TCP)

Choice c

Internet Protocol (IP)

Choice d

User Datagram Protocol (UDP)

28. What is NOT a reason that Netcat is regularly found on computers that have been infected with a Trojan?

Choice a

Netcat can be used to send or receive files over any port

Choice b

Netcat encrypts all communications

Choice c

Netcat can be used to perform port scanning

Choice d

Netcat can listen on any port and send data to any port

29. Enumeration is also known as ___

Choice a

the process to gather the information about a target machine by actively connecting to it

Choice b

the process to maintain the network access after a breach

Choice c

the process of closing a breach as part of incident response

Choice d

the process to map a target network footprint

30. Which principle determines what resources the user can use on the network?

Choice a

Identification

Choice b

Accountability

Choice c

Authentication

Choice d

Authorization

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!