logo

Crowdly

Browser

Add to Chrome

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Network File System (NFS) is a protocol for distributed file sharing on a network. Which of the following was designed for sniffing this traffic?
100%
0%
0%
0%
View this question
Which of the following is a preventive control?
0%
0%
71%
29%
0%
View this question
Which of the following is the primary objective of a rootkit?
0%
100%
0%
0%
View this question
Examine the following SOA record: “` @ IN SOARTDNSRV1.anybiz.com. postmaster anybiz.com. ( 200408097 ; serial number 3600 ; refresh [1h] 600 ; retry [10m] 86400 ; expire [1d] 7200 ; min TTL [2h] “` If a zone transfer fails, how long will the secondary server wait before attempting another one?
0%
100%
0%
0%
View this question
Which of the following is a client-server tool utilized to evade firewall inspection?
0%
0%
0%
0%
View this question
A systems administrator notices log entries from a host named MACHINE_A (195.16.88.12) are not showing up on the syslog server (195.16.88.150). Which of the following Wireshark filters would show any
0%
0%
0%
0%
0%
View this question
A client wants the pentest attack to simulate an inside user who finds ways to elevate privileges and create attacks. Which test type does the client want?
0%
0%
0%
0%
View this question
An IDS installed on the network perimeter sees a spike in traffic during off-duty hours and begins logging and alerting. Which type of IDS is in place?
0%
0%
0%
100%
View this question
Under what conditions does a secondary name server request a zone transfer from a primary name server?
0%
20%
80%
0%
0%
View this question
What is the term used to describe searching for open modems on a target?
0%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome