Question: Question 15 How do SYN scans differ from FIN scans in nmap? You may choose more than one answer. SYN scans don't work on Linux
Question 15
How do SYN scans differ from FIN scans in nmap? You may choose more than one answer.
| SYN scans don't work on Linux systems. | ||
| FIN scans can pass through firewalls. | ||
| FIN scans don't work on Windows systems. | ||
| Both scans find the same ports. |
10 points
Question 16
AES is only secure when used in Electronic Code Book (ECB) mode.
True
False
10 points
Question 17
Identify which secure design principle is being followed or violated in the following situation. Changing a firewall architecture from a single gateway firewall to a DMZ architecture with two firewalls.
| Least Privilege | ||
| Fail-Safe Defaults | ||
| Economy of Mechanism | ||
| Complete Meditation | ||
| Open Design | ||
| Separation of Privilege | ||
| Least Common Mechanism | ||
| Psychological Acceptability |
10 points
Question 18
Captive portal security on a wireless network can be bypassed by which of the following techniques.
| ARP spoofing | ||
| DNS spoofing | ||
| IP spoofing | ||
| MAC spoofing |
10 points
Question 19
Which of the following techniques can be used to evade detection by a signature-based intrusion detection system? You may choose more than one answer.
| Fragmentation of packets | ||
| Changing the case of filenames. | ||
| URL encoding | ||
| Overly long paths with extra ./ sequences |
10 points
Question 20
"Eve performs an FMS WEP cracking attack. Classify this as a violation of confidentiality, integrity, or availability."
| Confidentiality | ||
| Integrity | ||
| Availability |
10 points
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
