what is the function of the first sixteen bits?
During a network capture in Network Monitor, you capture some UDP traffic. In a UDP Header,
what is the function of the first sixteen bits?
What will the controls be related to?
Security controls shall be documented. What will the controls be related to?
Which one of the following is NOT a characteristic of a process?
Which one of the following is NOT a characteristic of a process?
Which one of the following is not a major component of the Internet?
You have been hired to work in the security division of a global Tier One ISP. You have been
given a staff of 25 people all new to network security. You wish to bring them all up to speed on
the components of the Internet and how they interact. Which one of the following is not a major
component of the Internet?
Take a look at the HTML code sample presented here and determine the line that presents the vulnerability:
Most companies that do business via the Web offer a shopping cart so you can specify all the
items you want before placing the order. Poor shopping cart design, however, can allow a different
kind of hack. Take a look at the HTML code sample presented here and determine the line that
presents the vulnerability:
<code>
<FORM ACTION=”http://10.0.10.236/cgi-bin/orders.pl” method=”post”>
<input type=hidden name=”price” value=”39.95″>
<input type=hidden name=”item_no” value=”WIDGET9″>
QUANTITY: <input type=text name=”quantity” size=2 maxlength=2 value=1>
</FORM>
</code>
what is the function of the Protocol field?
During a network capture in Wireshark, you capture some IP traffic. In the IP Datagram, what is
the function of the Protocol field?
Which of the following are within the scope of service asset and configuration management?
Which of the following are within the scope of service asset and configuration management?
1. Identification of configuration items (CIs)
2. Recording relationships between CIs
3. Recording and control of virtual CIs
4. Approving finance for the purchase of software to support service asset and configuration management
What is the function of the Tier System in the physical structure of the Internet?
You are discussing the design and infrastructure of the Internet with several colleagues when a
disagreement begins over the actual function of the Tier System in the Internets design. What is
the function of the Tier System in the physical structure of the Internet?
What is the network ID to which this host belongs?
You are configuring the IP addressing for your network. One of the subnets has been defined with
addresses already. You run ifconfig on a host and determine that it has an address of
172.18.32.54 with a mask of 255.255.254.0. What is the network ID to which this host belongs?
when shall a customer be informed of this?
If the service provider believes the service levels will not be met for an incident, when shall a
customer be informed of this?