GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

After gaining access to a Windows machine, you see the last…

After gaining access to a Windows machine, you see the last command executed on the box looks like this: net use F: \\MATTBOX\BankFiles /persistent :yes Assuming the user had appropriate credentials, which of the following are true (Choose all that apply):

Read Details

Google Docs and Salesforce CRM are two examples of which clo…

Google Docs and Salesforce CRM are two examples of which cloud computing model?

Read Details

Which of the following don’t use ICMP in the attack? (Choose…

Which of the following don’t use ICMP in the attack? (Choose two)

Read Details

Which of the following works at Layer 5 of the OSI model?

Which of the following works at Layer 5 of the OSI model?

Read Details

How does Tripwire (and programs like it) help against Trojan…

How does Tripwire (and programs like it) help against Trojan attacks?

Read Details

An ethical hacker is ACK-scanning against a network segment…

An ethical hacker is ACK-scanning against a network segment he knows is sitting behind a stateful firewall. If a scan packet receives no response, what does that indicate?

Read Details

You are configuring rules for your Snort installation and wa…

You are configuring rules for your Snort installation and want to have an alert message of “Attempted FTP” on any FTP packet coming from an outside address intended for one of your internal hosts. Which of the following rules are correct for this situation?

Read Details

How does Tripwire (and programs like it) help against Trojan…

How does Tripwire (and programs like it) help against Trojan attacks?

Read Details

A security staff is preparing for a security audit and wants…

A security staff is preparing for a security audit and wants to know if additional security training for the end user would be beneficial. Which of the following methods would be the best option for testing the effectiveness of user training in the environment?

Read Details

Which of the following best describes a honeypot?

Which of the following best describes a honeypot?

Read Details

Posts pagination

Newer posts 1 … 37,863 37,864 37,865 37,866 37,867 … 74,919 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top