- (Topic 2)
How does a denial-of-service attack work?
Correct Answer:A
- (Topic 4)
Which of the following guidelines or standards is associated with the credit card industry?
Correct Answer:D
- (Topic 6)
You receive an email with the following message: Hello Steve,
We are having technical difficulty in restoring user database record after the recent blackout. Your account data is corrupted. Please logon to the SuperEmailServices.com and change your password.
http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm
If you do not reset your password within 7 days, your account will be permanently disabled locking you out from our e-mail services.
Sincerely, Technical Support
SuperEmailServices
From this e-mail you suspect that this message was sent by some hacker since you have been using their e-mail services for the last 2 years and they have never sent out an e-mail such as this. You also observe the URL in the message and confirm your suspicion about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following at Windows 2000 command prompt:
Ping 0xde.0xad.0xbe.0xef
You get a response with a valid IP address.
What is the obstructed IP address in the e-mail URL?
Correct Answer:A
0x stands for hexadecimal and DE=222, AD=173, BE=190 and EF=239
- (Topic 5)
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
Correct Answer:A
- (Topic 2)
John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the name of this tool?
Correct Answer:B
- (Topic 8)
When referring to the Domain Name Service, what is denoted by a ‘zone’?
Correct Answer:B
A reasonable definition of a zone would be a portion of the DNS namespace where responsibility has been delegated.