- (Topic 2)
Which of the following tools uses exploits to break into remote operating systems?
Correct Answer:
B
- (Topic 3)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?
Correct Answer:
C
- (Topic 2)
You are sending a file to an FTP server. The file will be broken into several pieces of information packets (segments) and will be sent to the server. The file will again be reassembled and reconstructed once the packets reach the FTP server. Which of the following information should be used to maintain the correct order of information packets during the reconstruction of the file?
Correct Answer:
D
- (Topic 1)
When a DNS server transfers its zone file to a remote system, what port does it typically use?
Correct Answer:
D
Reference:
http://www.networkworld.com/article/2231682/cisco-subnet/cisco-subnet-allow-both-tcp-and-udp-port-53-to-your-dns-servers.html
- (Topic 4)
What does TCSEC stand for?
Correct Answer:
A