PrepAway - Latest Free Exam Questions & Answers

Tag: Briefing CISSP (update December 20th, 2017)

Briefing CISSP: Certified Information Systems Security Professional (update December 20th, 2017)

The spoofed IP address used by the attacker as the sour…

What sort of attack is described by the following: An attacker has a list of broadcast addresses which it stores
into an array, the attacker sends a spoofed icmp echo request to each of those addresses in series and starts
again. The spoofed IP address used by the attacker as the source of the packets is the target/victim IP
address.

What protocol was used here to conduct the file transfer?

You are using an open source packet analyzer called Wireshark and are sifting through the various
conversations to see if anything appears to be out of order.
You are observing a UDP conversation between a host and a router. It was a file transfer between the two on
port 69. What protocol was used here to conduct the file transfer?

This is only 16 bits which isn’t much but it concerns y…

You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for
later review. Every Friday when major deposits are made you’re seeing a series of bits placed in the “Urgent
Pointer” field of a TCP packet. This is only 16 bits which isn’t much but it concerns you because:


Page 57 of 129« First...102030...5556575859...708090...Last »