Question: Question 6 Anika needs to configure her system such that critical batch processing can take place at night, when no employees are active. If an
Question 6
Anika needs to configure her system such that critical batch processing can take place at night, when no employees are active. If an employee were to login during that time they could delay batch processing which would delay opening in the morning. She configures the system to block all non-administrative access between the hours of 2000 and 0400. This would be an example of:
| A. | Role-Based Access |
| B. | Rule-Based Access |
| C. | Subject-Based Access |
| D. | Risk-Based Access |
Question 7
Katya is maliciously filling out a form on a web site. She intentionally embeds characters used in SQL queries to see if the site throws any malformed SQL errors. She is attempting to find what kind of vulnerability?
| A. | SQL Injection |
| B. | Cross-Site Scripting |
| C. | Trojan Horse |
| D. | Memory Leak |
Question 8
Natalia thinks she has finally found the reason why the router quits listening to one of its interfaces. It appears to quit sending and receiving on that interface after it receives a packet with a payload of zero bytes. The router's software must crash when that happens. Now she wants to find the source of these messages. Which of the following does she suspect is the cause of the issue?
| A. | Malformed IP Packets |
| B. | Packet Sniffing |
| C. | ARP Table Flooding |
| D. | Somebody has spliced into a cable |
Question 9
Olivia is reviewing blueprints for a new office building. The cables leading from the data center (third floor) will lead to the Internet provider's point of presence (PoP) passing through the backrooms of two commercial retail stores on the ground floor. At the next design meeting, she will insist those cables will be run through conduit. What is her most likely concern?
| A. | Wireless jamming |
| B. | Packet sniffing |
| C. | Cables being accidentally cut |
| D. | ARP exploits |
Question 10
Carly has gained access to a computer on the UltraTech corporate network. She's discovered another computer on the same network segment running a web server that she believes is handling very important transactions. She configures the computer to which she has access to start sending ARP packets as if her host had the same IP address as the web server. If she's successful, transactions originally bound for the web server will start to arrive at her compromised computer. Which of the following is she doing?
| A. | ARP Spoofing |
| B. | MAC Spoofing |
| C. | IP Spoofing |
| D. | SQL Injection |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
