00:00

QUESTION 86

Which of the following services CANNOT be performed by the nmap utility?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: AB

QUESTION 87

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Correct Answer: C

QUESTION 88

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Correct Answer: B

QUESTION 89

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

Correct Answer: C

QUESTION 90

Which of the following statements about smurf is true?

Correct Answer: B