Question 31

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

Correct Answer:C

Question 32

What is the proper response for a NULL scan if the port is open?

Correct Answer:F

Question 33

What is the proper response for a NULL scan if the port is closed?

Correct Answer:E

Question 34

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.
What is this document called?

Correct Answer:B

Question 35

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?

Correct Answer:B

Question 36

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

Correct Answer:B

START 312-50v11 EXAM