PrepAway - Latest Free Exam Questions & Answers

Author: admin

How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over

How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets.

Unauthorized users are still able to connect to the wireless network. Why do you think this is possible?

In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless network. Unfortunately unauthorized users are still able to connect to the wireless network. Why do you think this is possible?

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

which is based on the European Institute for Computer Antivirus Research format that can be detected by the AV

You have installed antivirus software and you want to be sure that your AV signatures are working correctly. You don’t want to risk the deliberate introduction of a live virus to test the AV software. You would like to write a harmless test virus, which is based on the European Institute for Computer Antivirus Research format that can be detected by the AV software.

How should you proceed?

What is Paula seeing happen on this computer?

Paula works as the primary help desk contact for her company.Paula has just received a call from a user reporting that his computer just displayed a Blue Screen of Death screen and he can no longer work.Paula walks over to the user’s computer and sees the Blue Screen of Death screen.The user’s computer is running Windows XP, but the Blue Screen looks like a familiar one that Paula had seen on Windows 2000 computers periodically.

The user said he stepped away from his computer for only 15 minutes and when he got back, the Blue Screen was there.Paula also noticed that the hard drive activity light was flashing, meaning that the computer was processing something.Paula knew this should not be the case since the computer should be completely frozen during a Blue Screen. She checks the network IDS live log entries and notices numerous nmap scan alerts.

What is Paula seeing happen on this computer?

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link c

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

Which part of the Windows Registry contains the user’s password file?

Which part of the Windows Registry contains the user’s password file?


Page 225 of 231« First...102030...223224225226227...230...Last »