What is the IP protocol ID for TCP?
You are introducing a co-worker to the security systems in place in your organization. During the
discussion you begin talking about the network, and how it is implemented. You decide to run a
packet capture to identify different aspects of network traffic for your co-worker. In the packet
capture you are able to identify Protocol IDs. What is the IP protocol ID for TCP?
What is included in these measurements?
The success and failure of Releases shall be measured. What is included in these
measurements?
Which of the following activities are performed by a desk?
Which of the following activities are performed by a desk?
1. Logging details of incidents and service requests
2. Providing first-line investigation and diagnosis
3. Restoring service
4. Implementing all standard changes
Which of the following do Buffer Overflows exploit?
You are studying the current attack methods and find that one of your servers is vulnerable to a
Buffer
Overflow attack. Which of the following do Buffer Overflows exploit?
In Step 2 of a normal three-way handshake, the server is said to be performing:
The three-way handshake utilizes three steps, identified as: Step 1, 2 and 3, that take place
between a client and a server in order to establish a TCP connection.
In Step 2 of a normal three-way handshake, the server is said to be performing:
What services can be left out of the Service Catalogue?
What services can be left out of the Service Catalogue?
When can a known error record be raised?
When can a known error record be raised?
1. At any time it would be useful to do so
2. After a workaround has been found
which type of DNS Spoofing?
You work for a medium sized ISP and there have been several attacks of the DNS configuration
recently.
You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false
data to a
DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?
Which of the following is the name of the Active X authentication system Microsoft has included to prevent Act
Which of the following is the name of the Active X authentication system Microsoft has included to
prevent Active X controls from being altered or corrupted by attackers wanting to perform
unwarranted operations?
which of the following?
A significant function of TCP is the ability to guarantee session information. The method used by
TCP to guarantee the uniqueness of a session between two hosts is which of the following?