- (Topic 3)
Where is the startup configuration located on a router?
Correct Answer:C
- (Topic 2)
What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?
Correct Answer:B
- (Topic 1)
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?
Correct Answer:A
- (Topic 1)
Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___ to transfer log messages in a clear text format.
Correct Answer:A
- (Topic 3)
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?
Correct Answer:B
The Fraggle attack is like a smurf attack, but uses UDP packets and not ICMP.
- (Topic 2)
An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ____ media used to store large amounts of data and are not affected by the magnet.
Correct Answer:B