00:00

QUESTION 91

- (Topic 2)
Which of the following tools uses exploits to break into remote operating systems?

Correct Answer: B

QUESTION 92

- (Topic 3)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Correct Answer: C

QUESTION 93

- (Topic 2)
You are sending a file to an FTP server. The file will be broken into several pieces of information packets (segments) and will be sent to the server. The file will again be reassembled and reconstructed once the packets reach the FTP server. Which of the following information should be used to maintain the correct order of information packets during the reconstruction of the file?

Correct Answer: D

QUESTION 94

- (Topic 1)
When a DNS server transfers its zone file to a remote system, what port does it typically use?

Correct Answer: D
Reference:
http://www.networkworld.com/article/2231682/cisco-subnet/cisco-subnet-allow-both-tcp-and-udp-port-53-to-your-dns-servers.html

QUESTION 95

- (Topic 4)
What does TCSEC stand for?

Correct Answer: A