PrepAway - Latest Free Exam Questions & Answers

Tag: code is will log all keystrokes#sclient=psy-ab

What other command could Michael use to attempt to freeze up the router?

Michael is an IT security consultant currently working under contract for alarge state agency in New York. Michael has been given permission to perform any tests necessary against the agency’s network. The agency’s network has come under many DoS attacks in recent months, so the agency’s IT team has tried to take precautions to prevent any future DoS attacks. To test this, Michael attemptsto gain unauthorized access or even overload one of the agency’s Cisco routers that is at IP address 192.168.254.97. Michael first creates a telnet session over port 23 to the router. He uses a random username and tries to input a very large password to see if that freezes up the router. This seems to have no affect on the router yet. What other command could Michael use to attempt to freeze up the router?

What registry key permission should Theresa check to ensure that Qfecheck runs properly?

Theresa is the chief information security officer for her company, a large shipping company based out of New York City. In the past, Theresa and her IT employees manually checked the status of client computers on the network to see ifthey had the most recent Microsoft updates. Now that the company has added over100 more clients to accommodate new departments, Theresa must find some kind of tool to see whether the clients are up-to-date or not. Theresa decides to useQfecheck to monitor all client computers. When Theresa runs the tool, she is repeatedly told that the software does not have the proper permissions to scan. Theresa is worried that the operating system hardening that she performs on all clients is keeping the software from scanning the necessary registry keys on theclient computers. What registry key permission should Theresa check to ensure that Qfecheck runs properly?

What measures can Bill take to help prevent future reflective DoS attacks against the ISP’s network?

Bill is an IT security consultant who has been hired on by an ISP that has recently been plagued by numerous DoS attacks. The ISP did not have the internalresources to prevent future attacks, so they hired Bill for his expertise. Bill looks through the company’s firewall logs and can see from the patterns that the attackers were using reflected DoS attacks. What measures can Bill take to help prevent future reflective DoS attacks against the ISP’s network? (Select 2)