Please answer the ALL the questions carefully. Thanks 20- A port scanner determi
ID: 3714031 • Letter: P
Question
Please answer the ALL the questions carefully. Thanks
20- A port scanner determine a host's OS while scanning. This in example of? A) packet OS fingerprinting B) passive OS fingerprinting C) active OS fingerprinting D) port OS fingerprinting 21- while using a standard photo software package, security administrator discovers proximity information is embedded in some photos. This is an example of? A) data-at-rest B) steganography D) geotagging 22- following a system review, one corporate workstation was found to be strong passwords and cleartext. Which of the following is the correct method for passwords? A) Hashing the password prior to storing B) Encrypting the password prior to strong C) Creating a digital certificate of the password prior to strong D) Using steganography to conceal the password prior to strong 23- A user plugs both ends of network cable into the two Ethernet jacks on the wall, which causes a network outage, which of the following should the network administrator implement to prevent this in the future? A) Spanning tree protocol B) Port security C) DHCP snooping D) BPDU guard 24- A company set up a corporative Wi-Fi access point and wishes to control who joins the wireless network. To prevent unknown users from connecting to access point, wireless devices must be verified with individuals user credentials before accessing Wi-Fi. The devices need to pass a Network readiness test once connected, verify a proper OS patch level, and have updated at antivirus software. Which of the following would best me those requirements? (Select TWO answers) A) Wpa2-PSK B) NAC C)Port security D) 802.1x E) NIPS 25- during a disaster recovery testing procedure, a typically disabled services on the application server was started. Which of the following tools would best identify situation in which of the servers is not to shut down? A) NIDS B) Beasline C) File integrity monitoring D) SIEMExplanation / Answer
Solutions:
Ans 20:Port Scanner is an example of Active Fingerprinting.A port scanner sends queries on specific ports.This is used by attackers to determine the role of the servers.Ans is (C).
Ans 21:Proximity information is used add advertising content associated with a place i.e. it embeds information for location specific business and websites.So when a picture is embedded with proximity information it is called as Geotagging.So the ans is (D)
Ans 22:Since the passwords are clear text , then hashing is the best way store the passwords.So the ans is (A).
Ans 23:By plugging two ends of a network cable into the Ethernet jacks will create a physical loop that causes a broadcast storm.This will saturate the router's switch with traffic so that no other data can get through.So the network admininstrator should implement the Spanning Tree Protocol.This detects and helps in preventing loops.So the ans is (A)
Ans 24:For creating a secured Wi-Fi network for a company the tho requirements that must be satisfied are WPA2-PSK and 802.1x.WPA2-PSK stands for Wi-Fi Protected Access2-Pre-Shared Key and is used to secure network using WPA2 with the use PSK authentication. 802.1x is used to accept or reject users. So the Ans is (A,D).
Ans 25:SIEM is the best tool that can be used to check which server is not to shut down.SIEM stands for Security Information and Evenet Management.SIEM has the following capabailities:
1.log collection,2.Notoficatins and Alerts 3.Security Incodent Detection 4.Threat Resoponse WorkFlow
So the Ans is (D).