Question 13

When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?

Correct Answer:B

Question 14

Which of the following TCP packet flags indicates that host should IMMEDIATELY terminate the connection containing the packet?

Correct Answer:D

Question 15

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

Correct Answer:C

Question 16

You have set up a local area network for your company. Your firewall separates your network into several sections: a DMZ with semi-public servers (web, dns, email) and an intranet with private servers. A penetration tester gains access to both sections and installs sniffers in each. He is able to capture network traffic for all the devices in the private section but only for one device (the device with the sniffer) in the DMZ. What can be inferred about the design of the system?

Correct Answer:B

Question 17

Which of the following commands is used to change file access permissions in Linux?

Correct Answer:C

Question 18

Your system has been infected by malware. Upon investigation, you discover that the malware propagated primarily via email. The malware attacked known vulnerabilities for which patches are available, but due to problems with your configuration management system you have no way to know which systems have been patched and which haven't, slowing your progress in patching your network. Of the following, which solution would you use to protect against this propagation vector?

Correct Answer:B

START GSEC EXAM