00:00

QUESTION 21

- (Topic 23)
What do you call a pre-computed hash?

Correct Answer: C

QUESTION 22

- (Topic 23)
Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to- date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction?

Correct Answer: B

QUESTION 23

- (Topic 23)
Lee is using Wireshark to log traffic on his network. He notices a number of packets being directed to an internal IP from an outside IP where the packets are ICMP and their size is around 65,536 bytes. What is Lee seeing here?

Correct Answer: C

QUESTION 24

- (Topic 9)
What are the six types of social engineering?(Choose six).

Correct Answer: BCDEFG
All social engineering is performed by taking advantage of human nature. For in-depth information on the subject review, read Robert Cialdini's book, Influence: Science and Practice.

QUESTION 25

- (Topic 20)
Choose one of the following pseudo codes to describe this statement:
If we have written 200 characters to the buffer variable, the stack should stop because it cannot hold any more data.

Correct Answer: D