Question 91

- (Exam Topic 1)
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

Correct Answer:B

Question 92

- (Exam Topic 3)
Which of the following statements is TRUE with respect to the Registry settings in the user start-up folder HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce.

Correct Answer:D

Question 93

- (Exam Topic 3)
What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?

Correct Answer:A

Question 94

- (Exam Topic 1)
A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?

Correct Answer:C

Question 95

- (Exam Topic 2)
You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Correct Answer:A

Question 96

- (Exam Topic 3)
What is the purpose of using Obfuscator in malware?

Correct Answer:C

START 312-49v10 EXAM