Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
CD
Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?
Correct Answer:
C
Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?
Correct Answer:
A
Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
BCD
Which of the following is the method of hiding data within another media type such as graphic or document?
Correct Answer:
B