⟩ Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system. A. Sequence Verifier B. Initial sequence number C. Address spoofing D. Time to Live E. IP ID field?
C. Address spoofing
C. Address spoofing
Explain Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with? A. arp B. netstat C. nbtstat D. tracert
Suppose 1 What is an intranet? A. A searchable internal repository that stores an organizations proprietary documents B. A worldwide network available to anyone who has a TCP/IP connection on a computer C. A TCP/IP-based network accessible only by an organizations members and employees D. A TCP/IP-based network accessible only by an organizations internal employees and select external clients
Explain Which term describes a server at the highest level of the Domain Name System (DNS)? A. Master B. Primary C. Top level D. Root level
Explain Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)
Explain Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet? A. Secure Sockets Layer (SSL) B. Public Key Infrastructure (PKI) C. Electronic Data Interchange (EDI) D. Secure Electronic Transactions (SET)
Suppose You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of A. a copyright issue. B. a privacy concern. C. a trademark issue. D. a licensing concern.
Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)
Explain Which of the following allows multiple systems to communicate on a wireless network in infrastructure mode? A. A switch B. A wireless NIC C. A network access point (NAP) D. A wireless access point (WAP)
Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet? A. Secure Sockets Layer (SSL) B. Public Key Infrastructure (PKI) C. Electronic Data Interchange (EDI) D. Secure Electronic Transactions (SET)
Which term describes a server at the highest level of the Domain Name System (DNS)? A. Master B. Primary C. Top level D. Root level