Home
16.
What method is used to replicate DNS information for DNS servers but is also a tempting exploit target for attackers?
  • A.
    DNSSEC
  • B.
    AXR
  • C.
    DNS registration
  • D.
    Zone transfers
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
DNS zone transfers provide a method to replicate DNS information between DNS servers, but they are also a tempting target for attackers due to the amount of information that they contain. A properly secured DNS server will only allow zone transfers to specific, permitted peer DNS servers. DNSSEC is a suite of DNS security specifications, AXR is a made up term (AXFR is the zone transfer command), and DNS registration is how you register a domain name.
Report
Name Email  
17.
What flag does nmap use to enable operating system identification?
  • A.
    –os
  • B.
    –id
  • C.
    –o
  • D.
    –osscan
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Nmap’s operating system identification flag is –o. This enables OS detection. –A also enables OS identification and other features. –osscan with modifiers like –limit and –guess set specific OS identification features. –os and –id are not nmap flags.
Report
Name Email  
18.
What command-line tool can be used to determine the path that traffic takes to a remote system?
  • A.
    Whois
  • B.
    traceroute
  • C.
    nslookup
  • D.
    routeview
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Traceroute (or tracert on Windows systems) is a command-line tool that uses ICMP to trace the route that a packet takes to a host. Whois and nslookup are domain tools, and routeview is not a command-line tool.
Report
Name Email  
19.
What type of data can frequently be gathered from images taken on smartphones?
  • A.
    Extended Graphics Format
  • B.
    Exif
  • C.
    JPIF
  • D.
    PNGrams
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Exif (Exchangeable Image Format) data often includes location and camera data, allowing the images to be mapped and identified to a specific device or type of camera.
Report
Name Email  
20.
Which Cisco log level is the most critical?
  • A.
    0
  • B.
    1
  • C.
    7
  • D.
    10
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Log level 0 is used for emergencies in Cisco’s logging level scheme. Log level 7 is for debugging information and is at the bottom of the scale.
Report
Name Email