<< Prev Question Next Question >>

Question 21/169

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet 10.1.4.0/23.
Which of the following IP addresses could be leased as a result of the new configuration?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (169q)
Question 1: A regional bank hires your company to perform a security ass...
Question 2: You are attempting to man-in-the-middle a session. Which pro...
Question 3: An attacker uses a communication channel within an operating...
Question 4: Which of the following is the successor of SSL?...
Question 5: WPA2 uses AES for wireless data encryption at which of the f...
Question 6: Assume a business-crucial web-site of some company that is u...
Question 7: A hacker was able to sniff packets on a company's wireless n...
Question 8: If executives are found liable for not properly protecting t...
Question 9: Which type of security feature stops vehicles from crashing ...
Question 10: Why should the security analyst disable/remove unnecessary I...
Question 11: While scanning with Nmap, Patin found several hosts which ha...
Question 12: You have successfully comprised a server having an IP addres...
Question 13: Which of the following is an NMAP script that could help det...
Question 14: In the context of password security, a simple dictionary att...
Question 15: While reviewing the result of scanning run against a target ...
Question 16: An attacker, using a rogue wireless AP, performed an MITM at...
Question 17: Which of the following antennas is commonly used in communic...
Question 18: Which of the following is the best countermeasure to encrypt...
Question 19: An attacker attaches a rogue router in a network. He wants t...
Question 20: Passive reconnaissance involves collecting information throu...
Question 21: You are tasked to configure the DHCP server to lease the las...
Question 22: Which of the following programming languages is most suscept...
Question 23: Some clients of TPNQM SA were redirected to a malicious site...
Question 24: Which tool allows analysts and pen testers to examine links ...
Question 25: Which type of intrusion detection system can monitor and ale...
Question 26: What is a "Collision attack" in cryptography?...
Question 27: Which of the following resources does NMAP need to be used a...
Question 28: Every company needs a formal written document which spells o...
Question 29: The use of technologies like IPSec can help guarantee the fo...
Question 30: Which of the following is the BEST way to defend against net...
Question 31: Which of the following can the administrator do to verify th...
Question 32: Look at the following output. What did the hacker accomplish...
Question 33: The following is a sample of output from a penetration teste...
Question 34: Which of the following is an extremely common IDS evasion te...
Question 35: What is a "Collision attack" in cryptography?...
Question 36: A company's Web development team has become aware of a certa...
Question 37: Which method of password cracking takes the most time and ef...
Question 38: An incident investigator asks to receive a copy of the event...
Question 39: Susan has attached to her company's network. She has managed...
Question 40: A server has been infected by a certain type of Trojan. The ...
Question 41: Why containers are less secure that virtual machine?...
Question 42: You are tasked to configure the DHCP server to lease the las...
Question 43: Which of the following is assured by the use of a hash?...
Question 44: Alice encrypts her data using her public key PK and stores t...
Question 45: The security administrator of ABC needs to permit Internet t...
Question 46: A hacker is an intelligent individual with excellent compute...
Question 47: Bob learned that his username and password for a popular gam...
Question 48: You have successfully compromised a machine on the network a...
Question 49: A penetration tester is attempting to scan an internal corpo...
Question 50: In Trojan terminology, what is a covert channel? (Exhibit)...
Question 51: You are trying to break into a highly classified top-secret ...
Question 52: Which of the following tools is used by pen testers and anal...
Question 53: Which of the following Nmap commands will produce the follow...
Question 54: The security administrator of ABC needs to permit Internet t...
Question 55: The Open Web Application Security Project (OWASP) is the wor...
Question 56: A network administrator discovers several unknown files in t...
Question 57: What tool and process are you going to use in order to remai...
Question 58: What are two things that are possible when scanning UDP port...
Question 59: While testing the company's web applications, a tester attem...
Question 60: Assume a business-crucial web-site of some company that is u...
Question 61: Your team has won a contract to infiltrate an organization. ...
Question 62: Which of the following tools would MOST LIKELY be used to pe...
Question 63: Which of the following programming languages is most suscept...
Question 64: Bob received this text message on his mobile phone: ""Hello,...
Question 65: An attacker is trying to redirect the traffic of a small off...
Question 66: What is attempting an injection attack on a web server based...
Question 67: After trying multiple exploits, you've gained root access to...
Question 68: A circuit level gateway works at which of the following laye...
Question 69: A specific site received 91 ICMP_ECHO packets within 90 minu...
Question 70: Which of the following Nmap commands will produce the follow...
Question 71: An organization hires a tester to do a wireless penetration ...
Question 72: A large company intends to use Blackberry for corporate mobi...
Question 73: A pentester is using Metasploit to exploit an FTP server and...
Question 74: Using Windows CMD, how would an attacker list all the shares...
Question 75: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 76: Which of the following is a serious vulnerability in the pop...
Question 77: If you want only to scan fewer ports than the default scan u...
Question 78: In which of the following cryptography attack methods, the a...
Question 79: A technician is resolving an issue where a computer is unabl...
Question 80: A large company intends to use Blackberry for corporate mobi...
Question 81: What are the three types of authentication?...
Question 82: Which of the following is the least-likely physical characte...
Question 83: Which of the following steps for risk assessment methodology...
Question 84: You need a tool that can do network intrusion prevention and...
Question 85: You are doing an internal security audit and intend to find ...
Question 86: What are the three types of compliance that the Open Source ...
Question 87: What is a "Collision attack" in cryptography?...
Question 88: ........is an attack type for a rogue Wi-Fi access point tha...
Question 89: Which of the following is the successor of SSL?...
Question 90: ICMP ping and ping sweeps are used to check for active syste...
Question 91: A hacker is attempting to use nslookup to query Domain Name ...
Question 92: What is the best defense against privilege escalation vulner...
Question 93: It is an entity or event with the potential to adversely imp...
Question 94: Which tool can be used to silently copy files from USB devic...
Question 95: Study the snort rule given below: (Exhibit) From the options...
Question 96: TCP/IP stack fingerprinting is the passive collection of con...
Question 97: Which of the following guidelines or standards is associated...
Question 98: You have successfully gained access to a Linux server and wo...
Question 99: A computer technician is using a new version of a word proce...
Question 100: Which of the following is not a Bluetooth attack?...
Question 101: During a penetration test, a tester finds a target that is r...
Question 102: You are monitoring the network of your organizations. You no...
Question 103: Cryptography is the practice and study of techniques for sec...
Question 104: One advantage of an application-level firewall is the abilit...
Question 105: Jesse receives an email with an attachment labeled "Court_No...
Question 106: Which of the following programming languages is most suscept...
Question 107: In the field of cryptanalysis, what is meant by a "rubber-ho...
Question 108: From the two screenshots below, which of the following is oc...
Question 109: Cryptography is the practice and study of techniques for sec...
Question 110: To determine if a software program properly handles a wide r...
Question 111: DNS cache snooping is a process of determining if the specif...
Question 112: What is the code written for? (Exhibit)...
Question 113: Emil uses nmap to scan two hosts using this command: nmap -s...
Question 114: Which of the following is an adaptive SQL Injection testing ...
Question 115: During a black-box pen test you attempt to pass IRC traffic ...
Question 116: Which of the following is considered an acceptable option wh...
Question 117: A zone file consists of which of the following Resource Reco...
Question 118: Which of the following is the least-likely physical characte...
Question 119: A company's Web development team has become aware of a certa...
Question 120: The intrusion detection system at a software development com...
Question 121: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 122: What did the following commands determine? (Exhibit)...
Question 123: This is an attack that takes advantage of a web site vulnera...
Question 124: Let's imagine three companies (A, B and C), all competing in...
Question 125: Which of the following steps for risk assessment methodology...
Question 126: What does the following command in netcat do? nc -l -u -p555...
Question 127: To determine if a software program properly handles a wide r...
Question 128: An unauthorized individual enters a building following an em...
Question 129: What is the process of logging, recording, and resolving eve...
Question 130: You are attempting to run an Nmap port scan on a web server....
Question 131: Joseph was the Web site administrator for the Mason Insuranc...
Question 132: The use of alert thresholding in an IDS can reduce the volum...
Question 133: Your team has won a contract to infiltrate an organization. ...
Question 134: Which of the following tools is used to detect wireless LANs...
Question 135: You are performing a penetration test for a client and have ...
Question 136: Risks = Threats x Vulnerabilities is referred to as the:...
Question 137: Which of the following scanning tools is specifically design...
Question 138: Sophia travels a lot and worries that her laptop containing ...
Question 139: Which type of access control is used on a router or firewall...
Question 140: A consultant has been hired by the V.P. of a large financial...
Question 141: Which cipher encrypts the plain text digit (bit or byte) one...
Question 142: Which of the following security operations is used for deter...
Question 143: Jimmy is standing outside a secure entrance to a facility. H...
Question 144: Which of the following tools performs comprehensive tests ag...
Question 145: Bob is acknowledged as a hacker of repute and is popular amo...
Question 146: You are a Network Security Officer. You have two machines. T...
Question 147: Firewalk has just completed the second phase (the scanning p...
Question 148: What does a firewall check to prevent particular ports and a...
Question 149: A big company, who wanted to test their security infrastruct...
Question 150: Nation-state threat actors often discover vulnerabilities an...
Question 151: A bank stores and processes sensitive privacy information re...
Question 152: The establishment of a TCP connection involves a negotiation...
Question 153: An IT employee got a call from one our best customers. The c...
Question 154: What is the role of test automation in security testing?...
Question 155: Trinity needs to scan all hosts on a /16 network for TCP por...
Question 156: An attacker gains access to a Web server's database and disp...
Question 157: Advanced encryption standard is an algorithm used for which ...
Question 158: Under the "Post-attack Phase and Activities", it is the resp...
Question 159: Which of the following can the administrator do to verify th...
Question 160: One of your team members has asked you to analyze the follow...
Question 161: Session splicing is an IDS evasion technique in which an att...
Question 162: What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht...
Question 163: From the two screenshots below, which of the following is oc...
Question 164: The security administrator of ABC needs to permit Internet t...
Question 165: An attacker sniffs encrypted traffic from the network and is...
Question 166: An enterprise recently moved to a new office and the new nei...
Question 167: The "white box testing" methodology enforces what kind of re...
Question 168: Which of the following is a command line packet analyzer sim...
Question 169: Websites and web portals that provide web services commonly ...