Which packet does the server then expect from the client?
A client has sent a SYN packet to initiate the three-way TCP handshake. The server has then
replied with a SYN-ACK packet. Which packet does the server then expect from the client?
Which type of attack is most likely to occur in this situation?
An e-mail client on an end user’s desktop has just logged on to a remote server using POP3. The
login was not encrypted. Which type of attack is most likely to occur in this situation?
Which of the following describes a brute-force attack?
Which of the following describes a brute-force attack?
Which of the following Windows components is the most attractive feature for spyware and viruses to attack?
Which of the following Windows components is the most attractive feature for spyware and viruses
to attack?
What does Tripwire create that enables it to determine future changes on files?
You have just run Tripwire for the first time. What does Tripwire create that enables it to determine
future changes on files?
Which of the following describes this situation?
A folder in a Windows 2003 system that uses NTFS allows all users Full Control. However, no
user can delete any of the files in this folder. Which of the following describes this situation?
Which choice lists the elements that must be considered before permission is given to this user?
A user named jpage wants to access a file that exists on a share named //zeppelin/houses/. This
share resides on a volume that is formatted in NTFS. Which choice lists the elements that must be
considered before permission is given to this user?
Which of the following explains this situation?
You have noticed that your Linux Web server is acting strangely. The ls command does not list
files properly, and the net stat command does not list any active connections, even though you
know your Web server is receiving roughly 400 connections per hour. Which of the following
explains this situation?
Which of the following commands may help you understand why this happened?
You have issued the following command as root: # ushered rwaters However, the user add
command simply returns an error. Which of the following commands may help you understand
why this happened?
Which of the following is the most plausible explanation for this situation?
Consider the following firewall rules:
I incoming traffic:
TCP Port 25
TCP Port 139: Denied
UDP Port 137: Denied
UDP Port 138: Denied
ICMP echo request: Denied
I CMP echo reply: Denied
Outgoing traffic:
TCP Ports 1024 through 65,535 to port 80: Denied
T CP Port 80: Denied
ICMP echo request: Denied
I CMP echo reply: Denied
TCP Port 139: Denied
UDP Port 137: Denied
UDP Port 138: Denied
All company production servers reside behind the corporate firewall. However, you discover that
the Web server performance is very low. After sniffing the traffic to the Web server, you learn that
the Web server is experiencing a distributed denial-of-service attack in which millions of ping
packets are being directed at the server. Which of the following is the most plausible explanation
for this situation?