16.
What method is used to replicate DNS information for DNS
servers but is also a tempting exploit target for attackers?
- A.DNSSEC
- B.AXR
- C.DNS registration
- D.Zone transfers
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
DNS zone transfers provide a method to replicate DNS information between DNS servers, but they are also a tempting target for attackers due to the amount of information that they contain. A properly secured DNS server will only allow zone transfers to specific, permitted peer DNS servers. DNSSEC is a suite of DNS security specifications, AXR is a made up term (AXFR is the zone transfer command), and DNS registration is how you register a domain name. |
17.
What flag does nmap use to enable operating system identification?
- A.–os
- B.–id
- C.–o
- D.–osscan
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Nmap’s operating system identification flag is –o. This enables OS detection. –A also enables OS identification and other features. –osscan with modifiers like –limit and –guess set specific OS identification features. –os and –id are not nmap flags. |
18.
What command-line tool can be used to determine the path
that traffic takes to a remote system?
- A.Whois
- B.traceroute
- C.nslookup
- D.routeview
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Traceroute (or tracert on Windows systems) is a command-line tool that uses ICMP to trace the route that a packet takes to a host. Whois and nslookup are domain tools, and routeview is not a command-line tool. |
19.
What type of data can frequently be gathered from images
taken on smartphones?
- A.Extended Graphics Format
- B.Exif
- C.JPIF
- D.PNGrams
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Exif (Exchangeable Image Format) data often includes location and camera data, allowing the images to be mapped and identified to a specific device or type of camera. |
20.
Which Cisco log level is the most critical?
- A.0
- B.1
- C.7
- D.10
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Log level 0 is used for emergencies in Cisco’s logging level scheme. Log level 7 is for debugging information and is at the bottom of the scale. |