{"id":88568,"date":"2024-09-25T06:01:57","date_gmt":"2024-09-25T06:01:57","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=88568"},"modified":"2024-09-25T06:02:04","modified_gmt":"2024-09-25T06:02:04","slug":"312-38-dumps-v12-02-simple-and-quick-way-to-pass-the-ec-council-certified-network-defender-cnd-exam","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/312-38-dumps-v12-02-simple-and-quick-way-to-pass-the-ec-council-certified-network-defender-cnd-exam.html","title":{"rendered":"312-38 Dumps (V12.02) &#8211; Simple and Quick Way to Pass the EC-Council Certified Network Defender (CND) Exam"},"content":{"rendered":"\n<p>With the right learning resources, you can prepare for your EC-Council Certified Network Defender (CND) 312-38 exam well. DumpsBase has the latest 312-38 dumps (V12.02), providing you with the most accurate questions and answers to guide you through an efficient and effective way to prepare for the Certified Network Defender (CND) 312-38 certification exam. All the practice exam questions and answers are created by industry experts with extensive knowledge of the CND certification. Additionally, DumpsBase provides one year of free updates to ensure your 312-38 dumps remain current with any changes to the exam content. With DumpsBase&#8217;s comprehensive EC-Council 312-38 dumps (V12.02), you can approach the EC-Council Certified Network Defender (CND) exam with confidence.<\/p>\n<h2>EC-Council Certified Network Defender (CND) Certification Exam <em><span style=\"background-color: #00ff00;\">312-38 Free Dumps<\/span><\/em><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam8441\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-8441\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-8441\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-324079'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. <br \/>\r<br>Which of the following is the correct order in the risk management phase?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='324079' \/><input type='hidden' id='answerType324079' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324079[]' id='answer-id-1267661' class='answer   answerof-324079 ' value='1267661'   \/><label for='answer-id-1267661' id='answer-label-1267661' class=' answer'><span>Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring &amp; Review<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324079[]' id='answer-id-1267662' class='answer   answerof-324079 ' value='1267662'   \/><label for='answer-id-1267662' id='answer-label-1267662' class=' answer'><span>Risk Treatment, Risk Monitoring &amp; Review, Risk Identification, Risk Assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324079[]' id='answer-id-1267663' class='answer   answerof-324079 ' value='1267663'   \/><label for='answer-id-1267663' id='answer-label-1267663' class=' answer'><span>Risk Assessment, Risk Treatment, Risk Monitoring &amp; Review, Risk Identification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324079[]' id='answer-id-1267664' class='answer   answerof-324079 ' value='1267664'   \/><label for='answer-id-1267664' id='answer-label-1267664' class=' answer'><span>Risk Identification. Risk Assessment. Risk Monitoring &amp; Review, Risk Treatment<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-324080'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>John has implemented ________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.<\/div><input type='hidden' name='question_id[]' id='qID_2' value='324080' \/><input type='hidden' id='answerType324080' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324080[]' id='answer-id-1267665' class='answer   answerof-324080 ' value='1267665'   \/><label for='answer-id-1267665' id='answer-label-1267665' class=' answer'><span>DMZ<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324080[]' id='answer-id-1267666' class='answer   answerof-324080 ' value='1267666'   \/><label for='answer-id-1267666' id='answer-label-1267666' class=' answer'><span>Proxies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324080[]' id='answer-id-1267667' class='answer   answerof-324080 ' value='1267667'   \/><label for='answer-id-1267667' id='answer-label-1267667' class=' answer'><span>VPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324080[]' id='answer-id-1267668' class='answer   answerof-324080 ' value='1267668'   \/><label for='answer-id-1267668' id='answer-label-1267668' class=' answer'><span>NAT<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-324081'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>What command is used to terminate certain processes in an Ubuntu system?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='324081' \/><input type='hidden' id='answerType324081' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324081[]' id='answer-id-1267669' class='answer   answerof-324081 ' value='1267669'   \/><label for='answer-id-1267669' id='answer-label-1267669' class=' answer'><span>#grep Kill [Target Process}<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324081[]' id='answer-id-1267670' class='answer   answerof-324081 ' value='1267670'   \/><label for='answer-id-1267670' id='answer-label-1267670' class=' answer'><span>#kill-9[PID]<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324081[]' id='answer-id-1267671' class='answer   answerof-324081 ' value='1267671'   \/><label for='answer-id-1267671' id='answer-label-1267671' class=' answer'><span>#ps ax Kill<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324081[]' id='answer-id-1267672' class='answer   answerof-324081 ' value='1267672'   \/><label for='answer-id-1267672' id='answer-label-1267672' class=' answer'><span># netstat Kill [Target Process]<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-324082'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. <br \/>\r<br>What will happen if any one of the main nodes fail?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='324082' \/><input type='hidden' id='answerType324082' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324082[]' id='answer-id-1267673' class='answer   answerof-324082 ' value='1267673'   \/><label for='answer-id-1267673' id='answer-label-1267673' class=' answer'><span>Failure of the main node affects all other child nodes at the same level irrespective of the main node.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324082[]' id='answer-id-1267674' class='answer   answerof-324082 ' value='1267674'   \/><label for='answer-id-1267674' id='answer-label-1267674' class=' answer'><span>Does not cause any disturbance to the child nodes or its tranmission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324082[]' id='answer-id-1267675' class='answer   answerof-324082 ' value='1267675'   \/><label for='answer-id-1267675' id='answer-label-1267675' class=' answer'><span>Failure of the main node will affect all related child nodes connected to the main node<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324082[]' id='answer-id-1267676' class='answer   answerof-324082 ' value='1267676'   \/><label for='answer-id-1267676' id='answer-label-1267676' class=' answer'><span>Affects the root node only<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-324083'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. <br \/>\r<br>What is Stephanie working on?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='324083' \/><input type='hidden' id='answerType324083' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324083[]' id='answer-id-1267677' class='answer   answerof-324083 ' value='1267677'   \/><label for='answer-id-1267677' id='answer-label-1267677' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324083[]' id='answer-id-1267678' class='answer   answerof-324083 ' value='1267678'   \/><label for='answer-id-1267678' id='answer-label-1267678' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324083[]' id='answer-id-1267679' class='answer   answerof-324083 ' value='1267679'   \/><label for='answer-id-1267679' id='answer-label-1267679' class=' answer'><span>Data Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324083[]' id='answer-id-1267680' class='answer   answerof-324083 ' value='1267680'   \/><label for='answer-id-1267680' id='answer-label-1267680' class=' answer'><span>Usability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-324084'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. <br \/>\r<br>What is the best option to do this job?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='324084' \/><input type='hidden' id='answerType324084' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324084[]' id='answer-id-1267681' class='answer   answerof-324084 ' value='1267681'   \/><label for='answer-id-1267681' id='answer-label-1267681' class=' answer'><span>Install a CCTV with cameras pointing to the entrance doors and the street<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324084[]' id='answer-id-1267682' class='answer   answerof-324084 ' value='1267682'   \/><label for='answer-id-1267682' id='answer-label-1267682' class=' answer'><span>Use fences in the entrance doors<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324084[]' id='answer-id-1267683' class='answer   answerof-324084 ' value='1267683'   \/><label for='answer-id-1267683' id='answer-label-1267683' class=' answer'><span>Use lights in all the entrance doors and along the company's perimeter<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324084[]' id='answer-id-1267684' class='answer   answerof-324084 ' value='1267684'   \/><label for='answer-id-1267684' id='answer-label-1267684' class=' answer'><span>Use an IDS in the entrance doors and install some of them near the corners<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-324085'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. <br \/>\r<br>What type of security incident are the employees a victim of?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='324085' \/><input type='hidden' id='answerType324085' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324085[]' id='answer-id-1267685' class='answer   answerof-324085 ' value='1267685'   \/><label for='answer-id-1267685' id='answer-label-1267685' class=' answer'><span>Scans and probes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324085[]' id='answer-id-1267686' class='answer   answerof-324085 ' value='1267686'   \/><label for='answer-id-1267686' id='answer-label-1267686' class=' answer'><span>Malicious Code<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324085[]' id='answer-id-1267687' class='answer   answerof-324085 ' value='1267687'   \/><label for='answer-id-1267687' id='answer-label-1267687' class=' answer'><span>Denial of service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324085[]' id='answer-id-1267688' class='answer   answerof-324085 ' value='1267688'   \/><label for='answer-id-1267688' id='answer-label-1267688' class=' answer'><span>Distributed denial of service<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-324086'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)<\/div><input type='hidden' name='question_id[]' id='qID_8' value='324086' \/><input type='hidden' id='answerType324086' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324086[]' id='answer-id-1267689' class='answer   answerof-324086 ' value='1267689'   \/><label for='answer-id-1267689' id='answer-label-1267689' class=' answer'><span>802.15.4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324086[]' id='answer-id-1267690' class='answer   answerof-324086 ' value='1267690'   \/><label for='answer-id-1267690' id='answer-label-1267690' class=' answer'><span>802.15<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324086[]' id='answer-id-1267691' class='answer   answerof-324086 ' value='1267691'   \/><label for='answer-id-1267691' id='answer-label-1267691' class=' answer'><span>802.12<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324086[]' id='answer-id-1267692' class='answer   answerof-324086 ' value='1267692'   \/><label for='answer-id-1267692' id='answer-label-1267692' class=' answer'><span>802.16<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-324087'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.<\/div><input type='hidden' name='question_id[]' id='qID_9' value='324087' \/><input type='hidden' id='answerType324087' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324087[]' id='answer-id-1267693' class='answer   answerof-324087 ' value='1267693'   \/><label for='answer-id-1267693' id='answer-label-1267693' class=' answer'><span>255.255.255.0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324087[]' id='answer-id-1267694' class='answer   answerof-324087 ' value='1267694'   \/><label for='answer-id-1267694' id='answer-label-1267694' class=' answer'><span>18.12.4.1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324087[]' id='answer-id-1267695' class='answer   answerof-324087 ' value='1267695'   \/><label for='answer-id-1267695' id='answer-label-1267695' class=' answer'><span>172.168.12.4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324087[]' id='answer-id-1267696' class='answer   answerof-324087 ' value='1267696'   \/><label for='answer-id-1267696' id='answer-label-1267696' class=' answer'><span>169.254.254.254<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-324088'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Rick has implemented several firewalls and IDS systems across his enterprise network. <br \/>\r<br>What should he do to effectively correlate all incidents that pass through these security controls?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='324088' \/><input type='hidden' id='answerType324088' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324088[]' id='answer-id-1267697' class='answer   answerof-324088 ' value='1267697'   \/><label for='answer-id-1267697' id='answer-label-1267697' class=' answer'><span>Use firewalls in Network Address Transition (NAT) mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324088[]' id='answer-id-1267698' class='answer   answerof-324088 ' value='1267698'   \/><label for='answer-id-1267698' id='answer-label-1267698' class=' answer'><span>Implement IPsec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324088[]' id='answer-id-1267699' class='answer   answerof-324088 ' value='1267699'   \/><label for='answer-id-1267699' id='answer-label-1267699' class=' answer'><span>Implement Simple Network Management Protocol (SNMP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324088[]' id='answer-id-1267700' class='answer   answerof-324088 ' value='1267700'   \/><label for='answer-id-1267700' id='answer-label-1267700' class=' answer'><span>Use Network Time Protocol (NTP)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-324089'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. <br \/>\r<br>Which of the following factors will the administrator consider when deciding on the appropriate backup medium?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='324089' \/><input type='hidden' id='answerType324089' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324089[]' id='answer-id-1267701' class='answer   answerof-324089 ' value='1267701'   \/><label for='answer-id-1267701' id='answer-label-1267701' class=' answer'><span>Capability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324089[]' id='answer-id-1267702' class='answer   answerof-324089 ' value='1267702'   \/><label for='answer-id-1267702' id='answer-label-1267702' class=' answer'><span>Accountability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324089[]' id='answer-id-1267703' class='answer   answerof-324089 ' value='1267703'   \/><label for='answer-id-1267703' id='answer-label-1267703' class=' answer'><span>Extensibility<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324089[]' id='answer-id-1267704' class='answer   answerof-324089 ' value='1267704'   \/><label for='answer-id-1267704' id='answer-label-1267704' class=' answer'><span>Reliability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-324090'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which of the following network monitoring techniques requires extra monitoring software or hardware?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='324090' \/><input type='hidden' id='answerType324090' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324090[]' id='answer-id-1267705' class='answer   answerof-324090 ' value='1267705'   \/><label for='answer-id-1267705' id='answer-label-1267705' class=' answer'><span>Non-router based<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324090[]' id='answer-id-1267706' class='answer   answerof-324090 ' value='1267706'   \/><label for='answer-id-1267706' id='answer-label-1267706' class=' answer'><span>Switch based<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324090[]' id='answer-id-1267707' class='answer   answerof-324090 ' value='1267707'   \/><label for='answer-id-1267707' id='answer-label-1267707' class=' answer'><span>Hub based<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324090[]' id='answer-id-1267708' class='answer   answerof-324090 ' value='1267708'   \/><label for='answer-id-1267708' id='answer-label-1267708' class=' answer'><span>Router based<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-324091'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. <br \/>\r<br>What should Steven implement on the firewall to ensure this happens?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='324091' \/><input type='hidden' id='answerType324091' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324091[]' id='answer-id-1267709' class='answer   answerof-324091 ' value='1267709'   \/><label for='answer-id-1267709' id='answer-label-1267709' class=' answer'><span>Steven should use a Demilitarized Zone (DMZ)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324091[]' id='answer-id-1267710' class='answer   answerof-324091 ' value='1267710'   \/><label for='answer-id-1267710' id='answer-label-1267710' class=' answer'><span>Steven should use Open Shortest Path First (OSPF)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324091[]' id='answer-id-1267711' class='answer   answerof-324091 ' value='1267711'   \/><label for='answer-id-1267711' id='answer-label-1267711' class=' answer'><span>Steven should use IPsec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324091[]' id='answer-id-1267712' class='answer   answerof-324091 ' value='1267712'   \/><label for='answer-id-1267712' id='answer-label-1267712' class=' answer'><span>Steven should enabled Network Address Translation (NAT)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-324092'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>What is the name of the authority that verifies the certificate authority in digital certificates?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='324092' \/><input type='hidden' id='answerType324092' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324092[]' id='answer-id-1267713' class='answer   answerof-324092 ' value='1267713'   \/><label for='answer-id-1267713' id='answer-label-1267713' class=' answer'><span>Directory management system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324092[]' id='answer-id-1267714' class='answer   answerof-324092 ' value='1267714'   \/><label for='answer-id-1267714' id='answer-label-1267714' class=' answer'><span>Certificate authority<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324092[]' id='answer-id-1267715' class='answer   answerof-324092 ' value='1267715'   \/><label for='answer-id-1267715' id='answer-label-1267715' class=' answer'><span>Registration authority<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324092[]' id='answer-id-1267716' class='answer   answerof-324092 ' value='1267716'   \/><label for='answer-id-1267716' id='answer-label-1267716' class=' answer'><span>Certificate Management system<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-324093'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decided to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data. <br \/>\r<br>Which RAID level is used here?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='324093' \/><input type='hidden' id='answerType324093' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324093[]' id='answer-id-1267717' class='answer   answerof-324093 ' value='1267717'   \/><label for='answer-id-1267717' id='answer-label-1267717' class=' answer'><span>RAID 3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324093[]' id='answer-id-1267718' class='answer   answerof-324093 ' value='1267718'   \/><label for='answer-id-1267718' id='answer-label-1267718' class=' answer'><span>RAID 1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324093[]' id='answer-id-1267719' class='answer   answerof-324093 ' value='1267719'   \/><label for='answer-id-1267719' id='answer-label-1267719' class=' answer'><span>RAID 5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324093[]' id='answer-id-1267720' class='answer   answerof-324093 ' value='1267720'   \/><label for='answer-id-1267720' id='answer-label-1267720' class=' answer'><span>RAID 0<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-324094'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. <br \/>\r<br>What will be your first reaction as a first responder?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='324094' \/><input type='hidden' id='answerType324094' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324094[]' id='answer-id-1267721' class='answer   answerof-324094 ' value='1267721'   \/><label for='answer-id-1267721' id='answer-label-1267721' class=' answer'><span>Avoid Fear, Uncertainty and Doubt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324094[]' id='answer-id-1267722' class='answer   answerof-324094 ' value='1267722'   \/><label for='answer-id-1267722' id='answer-label-1267722' class=' answer'><span>Communicate the incident<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324094[]' id='answer-id-1267723' class='answer   answerof-324094 ' value='1267723'   \/><label for='answer-id-1267723' id='answer-label-1267723' class=' answer'><span>Make an initial assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324094[]' id='answer-id-1267724' class='answer   answerof-324094 ' value='1267724'   \/><label for='answer-id-1267724' id='answer-label-1267724' class=' answer'><span>Disable Virus Protection<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-324095'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>If a network is at risk from unskilled individuals, what type of threat is this?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='324095' \/><input type='hidden' id='answerType324095' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324095[]' id='answer-id-1267725' class='answer   answerof-324095 ' value='1267725'   \/><label for='answer-id-1267725' id='answer-label-1267725' class=' answer'><span>External Threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324095[]' id='answer-id-1267726' class='answer   answerof-324095 ' value='1267726'   \/><label for='answer-id-1267726' id='answer-label-1267726' class=' answer'><span>Structured Threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324095[]' id='answer-id-1267727' class='answer   answerof-324095 ' value='1267727'   \/><label for='answer-id-1267727' id='answer-label-1267727' class=' answer'><span>Unstructured Threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324095[]' id='answer-id-1267728' class='answer   answerof-324095 ' value='1267728'   \/><label for='answer-id-1267728' id='answer-label-1267728' class=' answer'><span>Internal Threats<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-324096'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. <br \/>\r<br>What needs to happen to force this server to use Windows Authentication?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='324096' \/><input type='hidden' id='answerType324096' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324096[]' id='answer-id-1267729' class='answer   answerof-324096 ' value='1267729'   \/><label for='answer-id-1267729' id='answer-label-1267729' class=' answer'><span>Edit the ADLIN file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324096[]' id='answer-id-1267730' class='answer   answerof-324096 ' value='1267730'   \/><label for='answer-id-1267730' id='answer-label-1267730' class=' answer'><span>Edit the shadow file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324096[]' id='answer-id-1267731' class='answer   answerof-324096 ' value='1267731'   \/><label for='answer-id-1267731' id='answer-label-1267731' class=' answer'><span>Remove the \/var\/bin\/localauth.conf file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324096[]' id='answer-id-1267732' class='answer   answerof-324096 ' value='1267732'   \/><label for='answer-id-1267732' id='answer-label-1267732' class=' answer'><span>Edit the PAM file to enforce Windows Authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-324097'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. <br \/>\r<br>What type of backup is Kelly using?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='324097' \/><input type='hidden' id='answerType324097' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324097[]' id='answer-id-1267733' class='answer   answerof-324097 ' value='1267733'   \/><label for='answer-id-1267733' id='answer-label-1267733' class=' answer'><span>Full backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324097[]' id='answer-id-1267734' class='answer   answerof-324097 ' value='1267734'   \/><label for='answer-id-1267734' id='answer-label-1267734' class=' answer'><span>Incremental backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324097[]' id='answer-id-1267735' class='answer   answerof-324097 ' value='1267735'   \/><label for='answer-id-1267735' id='answer-label-1267735' class=' answer'><span>Differential Backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324097[]' id='answer-id-1267736' class='answer   answerof-324097 ' value='1267736'   \/><label for='answer-id-1267736' id='answer-label-1267736' class=' answer'><span>Normal Backup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-324098'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. <br \/>\r<br>Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='324098' \/><input type='hidden' id='answerType324098' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324098[]' id='answer-id-1267737' class='answer   answerof-324098 ' value='1267737'   \/><label for='answer-id-1267737' id='answer-label-1267737' class=' answer'><span>Tcp.flags==0x2b<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324098[]' id='answer-id-1267738' class='answer   answerof-324098 ' value='1267738'   \/><label for='answer-id-1267738' id='answer-label-1267738' class=' answer'><span>Tcp.flags=0x00<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324098[]' id='answer-id-1267739' class='answer   answerof-324098 ' value='1267739'   \/><label for='answer-id-1267739' id='answer-label-1267739' class=' answer'><span>Tcp.options.mss_val&lt;1460<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324098[]' id='answer-id-1267740' class='answer   answerof-324098 ' value='1267740'   \/><label for='answer-id-1267740' id='answer-label-1267740' class=' answer'><span>Tcp.options.wscale_val==20<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-324099'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>A company has the right to monitor the activities of their employees on different information systems according to the _______policy.<\/div><input type='hidden' name='question_id[]' id='qID_21' value='324099' \/><input type='hidden' id='answerType324099' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324099[]' id='answer-id-1267741' class='answer   answerof-324099 ' value='1267741'   \/><label for='answer-id-1267741' id='answer-label-1267741' class=' answer'><span>Information system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324099[]' id='answer-id-1267742' class='answer   answerof-324099 ' value='1267742'   \/><label for='answer-id-1267742' id='answer-label-1267742' class=' answer'><span>User access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324099[]' id='answer-id-1267743' class='answer   answerof-324099 ' value='1267743'   \/><label for='answer-id-1267743' id='answer-label-1267743' class=' answer'><span>Internet usage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324099[]' id='answer-id-1267744' class='answer   answerof-324099 ' value='1267744'   \/><label for='answer-id-1267744' id='answer-label-1267744' class=' answer'><span>Confidential data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-324100'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. <br \/>\r<br>What layer of the OSI model do IPsec tunnels function on?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='324100' \/><input type='hidden' id='answerType324100' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324100[]' id='answer-id-1267745' class='answer   answerof-324100 ' value='1267745'   \/><label for='answer-id-1267745' id='answer-label-1267745' class=' answer'><span>The data link layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324100[]' id='answer-id-1267746' class='answer   answerof-324100 ' value='1267746'   \/><label for='answer-id-1267746' id='answer-label-1267746' class=' answer'><span>The session layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324100[]' id='answer-id-1267747' class='answer   answerof-324100 ' value='1267747'   \/><label for='answer-id-1267747' id='answer-label-1267747' class=' answer'><span>The network layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324100[]' id='answer-id-1267748' class='answer   answerof-324100 ' value='1267748'   \/><label for='answer-id-1267748' id='answer-label-1267748' class=' answer'><span>The application and physical layers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-324101'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. <br \/>\r<br>What is the last step he should list?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='324101' \/><input type='hidden' id='answerType324101' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324101[]' id='answer-id-1267749' class='answer   answerof-324101 ' value='1267749'   \/><label for='answer-id-1267749' id='answer-label-1267749' class=' answer'><span>Assign eradication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324101[]' id='answer-id-1267750' class='answer   answerof-324101 ' value='1267750'   \/><label for='answer-id-1267750' id='answer-label-1267750' class=' answer'><span>Recovery<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324101[]' id='answer-id-1267751' class='answer   answerof-324101 ' value='1267751'   \/><label for='answer-id-1267751' id='answer-label-1267751' class=' answer'><span>Containment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324101[]' id='answer-id-1267752' class='answer   answerof-324101 ' value='1267752'   \/><label for='answer-id-1267752' id='answer-label-1267752' class=' answer'><span>A follow-up.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-324102'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='324102' \/><input type='hidden' id='answerType324102' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324102[]' id='answer-id-1267753' class='answer   answerof-324102 ' value='1267753'   \/><label for='answer-id-1267753' id='answer-label-1267753' class=' answer'><span>Pipe Model<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324102[]' id='answer-id-1267754' class='answer   answerof-324102 ' value='1267754'   \/><label for='answer-id-1267754' id='answer-label-1267754' class=' answer'><span>AAA model<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324102[]' id='answer-id-1267755' class='answer   answerof-324102 ' value='1267755'   \/><label for='answer-id-1267755' id='answer-label-1267755' class=' answer'><span>Hub-and-Spoke VPN model<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324102[]' id='answer-id-1267756' class='answer   answerof-324102 ' value='1267756'   \/><label for='answer-id-1267756' id='answer-label-1267756' class=' answer'><span>Hose mode<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-324103'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. <br \/>\r<br>Which type of attack is James analyzing?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='324103' \/><input type='hidden' id='answerType324103' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324103[]' id='answer-id-1267757' class='answer   answerof-324103 ' value='1267757'   \/><label for='answer-id-1267757' id='answer-label-1267757' class=' answer'><span>ARP Sweep<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324103[]' id='answer-id-1267758' class='answer   answerof-324103 ' value='1267758'   \/><label for='answer-id-1267758' id='answer-label-1267758' class=' answer'><span>ARP misconfiguration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324103[]' id='answer-id-1267759' class='answer   answerof-324103 ' value='1267759'   \/><label for='answer-id-1267759' id='answer-label-1267759' class=' answer'><span>ARP spoofinq<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324103[]' id='answer-id-1267760' class='answer   answerof-324103 ' value='1267760'   \/><label for='answer-id-1267760' id='answer-label-1267760' class=' answer'><span>ARP Poisioning<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-324104'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Alex is administrating the firewall in the organization's network. <br \/>\r<br>What command will he use to check the ports applications open?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='324104' \/><input type='hidden' id='answerType324104' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324104[]' id='answer-id-1267761' class='answer   answerof-324104 ' value='1267761'   \/><label for='answer-id-1267761' id='answer-label-1267761' class=' answer'><span>Netstat -an<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324104[]' id='answer-id-1267762' class='answer   answerof-324104 ' value='1267762'   \/><label for='answer-id-1267762' id='answer-label-1267762' class=' answer'><span>Netstat -o<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324104[]' id='answer-id-1267763' class='answer   answerof-324104 ' value='1267763'   \/><label for='answer-id-1267763' id='answer-label-1267763' class=' answer'><span>Netstat -a<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324104[]' id='answer-id-1267764' class='answer   answerof-324104 ' value='1267764'   \/><label for='answer-id-1267764' id='answer-label-1267764' class=' answer'><span>Netstat -ao<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-324105'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. <br \/>\r<br>How should this risk be categorized in the risk matrix?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='324105' \/><input type='hidden' id='answerType324105' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324105[]' id='answer-id-1267765' class='answer   answerof-324105 ' value='1267765'   \/><label for='answer-id-1267765' id='answer-label-1267765' class=' answer'><span>High<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324105[]' id='answer-id-1267766' class='answer   answerof-324105 ' value='1267766'   \/><label for='answer-id-1267766' id='answer-label-1267766' class=' answer'><span>Medium<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324105[]' id='answer-id-1267767' class='answer   answerof-324105 ' value='1267767'   \/><label for='answer-id-1267767' id='answer-label-1267767' class=' answer'><span>Extreme<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324105[]' id='answer-id-1267768' class='answer   answerof-324105 ' value='1267768'   \/><label for='answer-id-1267768' id='answer-label-1267768' class=' answer'><span>Low<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-324106'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Identify the minimum number of drives required to setup RAID level 5. <br \/>\r<br><br><img decoding=\"async\" width=459 height=273 id=\"\u56fe\u7247 4\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/04\/image001-52.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_28' value='324106' \/><input type='hidden' id='answerType324106' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324106[]' id='answer-id-1267769' class='answer   answerof-324106 ' value='1267769'   \/><label for='answer-id-1267769' id='answer-label-1267769' class=' answer'><span>Multiple<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324106[]' id='answer-id-1267770' class='answer   answerof-324106 ' value='1267770'   \/><label for='answer-id-1267770' id='answer-label-1267770' class=' answer'><span>3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324106[]' id='answer-id-1267771' class='answer   answerof-324106 ' value='1267771'   \/><label for='answer-id-1267771' id='answer-label-1267771' class=' answer'><span>4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324106[]' id='answer-id-1267772' class='answer   answerof-324106 ' value='1267772'   \/><label for='answer-id-1267772' id='answer-label-1267772' class=' answer'><span>2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-324107'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.<\/div><input type='hidden' name='question_id[]' id='qID_29' value='324107' \/><input type='hidden' id='answerType324107' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324107[]' id='answer-id-1267773' class='answer   answerof-324107 ' value='1267773'   \/><label for='answer-id-1267773' id='answer-label-1267773' class=' answer'><span>SAN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324107[]' id='answer-id-1267774' class='answer   answerof-324107 ' value='1267774'   \/><label for='answer-id-1267774' id='answer-label-1267774' class=' answer'><span>SCSA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324107[]' id='answer-id-1267775' class='answer   answerof-324107 ' value='1267775'   \/><label for='answer-id-1267775' id='answer-label-1267775' class=' answer'><span>NAS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324107[]' id='answer-id-1267776' class='answer   answerof-324107 ' value='1267776'   \/><label for='answer-id-1267776' id='answer-label-1267776' class=' answer'><span>SAS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-324108'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>A local bank wants to protect their card holder data. The bank should comply with the________standard to ensure the security of card holder data.<\/div><input type='hidden' name='question_id[]' id='qID_30' value='324108' \/><input type='hidden' id='answerType324108' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324108[]' id='answer-id-1267777' class='answer   answerof-324108 ' value='1267777'   \/><label for='answer-id-1267777' id='answer-label-1267777' class=' answer'><span>HIPAA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324108[]' id='answer-id-1267778' class='answer   answerof-324108 ' value='1267778'   \/><label for='answer-id-1267778' id='answer-label-1267778' class=' answer'><span>ISEC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324108[]' id='answer-id-1267779' class='answer   answerof-324108 ' value='1267779'   \/><label for='answer-id-1267779' id='answer-label-1267779' class=' answer'><span>PCI DSS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324108[]' id='answer-id-1267780' class='answer   answerof-324108 ' value='1267780'   \/><label for='answer-id-1267780' id='answer-label-1267780' class=' answer'><span>SOAX<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-324109'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. <br \/>\r<br>Which type of network-based IDS is Sam implementing?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='324109' \/><input type='hidden' id='answerType324109' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324109[]' id='answer-id-1267781' class='answer   answerof-324109 ' value='1267781'   \/><label for='answer-id-1267781' id='answer-label-1267781' class=' answer'><span>Behavior-based IDS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324109[]' id='answer-id-1267782' class='answer   answerof-324109 ' value='1267782'   \/><label for='answer-id-1267782' id='answer-label-1267782' class=' answer'><span>Anomaly-based IDS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324109[]' id='answer-id-1267783' class='answer   answerof-324109 ' value='1267783'   \/><label for='answer-id-1267783' id='answer-label-1267783' class=' answer'><span>Stateful protocol analysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324109[]' id='answer-id-1267784' class='answer   answerof-324109 ' value='1267784'   \/><label for='answer-id-1267784' id='answer-label-1267784' class=' answer'><span>Signature-based IDS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-324110'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. <br \/>\r<br>Which type of firewall service is John thinking of implementing?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='324110' \/><input type='hidden' id='answerType324110' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324110[]' id='answer-id-1267785' class='answer   answerof-324110 ' value='1267785'   \/><label for='answer-id-1267785' id='answer-label-1267785' class=' answer'><span>Application level gateway<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324110[]' id='answer-id-1267786' class='answer   answerof-324110 ' value='1267786'   \/><label for='answer-id-1267786' id='answer-label-1267786' class=' answer'><span>Stateful Multilayer Inspection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324110[]' id='answer-id-1267787' class='answer   answerof-324110 ' value='1267787'   \/><label for='answer-id-1267787' id='answer-label-1267787' class=' answer'><span>Circuit level gateway<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324110[]' id='answer-id-1267788' class='answer   answerof-324110 ' value='1267788'   \/><label for='answer-id-1267788' id='answer-label-1267788' class=' answer'><span>Packet Filtering<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-324111'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. <br \/>\r<br>What type of device are you suggesting?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='324111' \/><input type='hidden' id='answerType324111' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324111[]' id='answer-id-1267789' class='answer   answerof-324111 ' value='1267789'   \/><label for='answer-id-1267789' id='answer-label-1267789' class=' answer'><span>The best solution to cover the needs of this company would be a HIDS device.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324111[]' id='answer-id-1267790' class='answer   answerof-324111 ' value='1267790'   \/><label for='answer-id-1267790' id='answer-label-1267790' class=' answer'><span>A NIDS device would work best for the company<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324111[]' id='answer-id-1267791' class='answer   answerof-324111 ' value='1267791'   \/><label for='answer-id-1267791' id='answer-label-1267791' class=' answer'><span>You are suggesting a NIPS device<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324111[]' id='answer-id-1267792' class='answer   answerof-324111 ' value='1267792'   \/><label for='answer-id-1267792' id='answer-label-1267792' class=' answer'><span>A HIPS device would best suite this company<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-324112'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. <br \/>\r<br>What are they? (Select all that apply) Risk factor =.............X...............X...........<\/div><input type='hidden' name='question_id[]' id='qID_34' value='324112' \/><input type='hidden' id='answerType324112' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324112[]' id='answer-id-1267793' class='answer   answerof-324112 ' value='1267793'   \/><label for='answer-id-1267793' id='answer-label-1267793' class=' answer'><span>Vulnerability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324112[]' id='answer-id-1267794' class='answer   answerof-324112 ' value='1267794'   \/><label for='answer-id-1267794' id='answer-label-1267794' class=' answer'><span>Impact<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324112[]' id='answer-id-1267795' class='answer   answerof-324112 ' value='1267795'   \/><label for='answer-id-1267795' id='answer-label-1267795' class=' answer'><span>Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324112[]' id='answer-id-1267796' class='answer   answerof-324112 ' value='1267796'   \/><label for='answer-id-1267796' id='answer-label-1267796' class=' answer'><span>Threat<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-324113'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. <br \/>\r<br>What type of solution would be best for Lyle?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='324113' \/><input type='hidden' id='answerType324113' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324113[]' id='answer-id-1267797' class='answer   answerof-324113 ' value='1267797'   \/><label for='answer-id-1267797' id='answer-label-1267797' class=' answer'><span>A NEPT implementation would be the best choice.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324113[]' id='answer-id-1267798' class='answer   answerof-324113 ' value='1267798'   \/><label for='answer-id-1267798' id='answer-label-1267798' class=' answer'><span>To better serve the security needs of his company, Lyle should use a HIDS system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324113[]' id='answer-id-1267799' class='answer   answerof-324113 ' value='1267799'   \/><label for='answer-id-1267799' id='answer-label-1267799' class=' answer'><span>Lyle would be best suited if he chose a NIPS implementation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324113[]' id='answer-id-1267800' class='answer   answerof-324113 ' value='1267800'   \/><label for='answer-id-1267800' id='answer-label-1267800' class=' answer'><span>He should choose a HIPS solution, as this is best suited to his needs.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-324114'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. <br \/>\r<br>Which filter will he use to view the traffic?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='324114' \/><input type='hidden' id='answerType324114' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324114[]' id='answer-id-1267801' class='answer   answerof-324114 ' value='1267801'   \/><label for='answer-id-1267801' id='answer-label-1267801' class=' answer'><span>Tcp.flags==0x000<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324114[]' id='answer-id-1267802' class='answer   answerof-324114 ' value='1267802'   \/><label for='answer-id-1267802' id='answer-label-1267802' class=' answer'><span>Tcp.flags==0000x<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324114[]' id='answer-id-1267803' class='answer   answerof-324114 ' value='1267803'   \/><label for='answer-id-1267803' id='answer-label-1267803' class=' answer'><span>Tcp.flags==000x0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324114[]' id='answer-id-1267804' class='answer   answerof-324114 ' value='1267804'   \/><label for='answer-id-1267804' id='answer-label-1267804' class=' answer'><span>Tcp.flags==x0000<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-324115'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. <br \/>\r<br>What does this source address signify?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='324115' \/><input type='hidden' id='answerType324115' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324115[]' id='answer-id-1267805' class='answer   answerof-324115 ' value='1267805'   \/><label for='answer-id-1267805' id='answer-label-1267805' class=' answer'><span>This address means that the source is using an IPv6 address and is spoofed and signifies an IPv4 address of 127.0.0.1.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324115[]' id='answer-id-1267806' class='answer   answerof-324115 ' value='1267806'   \/><label for='answer-id-1267806' id='answer-label-1267806' class=' answer'><span>This source address is IPv6 and translates as 13.1.68.3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324115[]' id='answer-id-1267807' class='answer   answerof-324115 ' value='1267807'   \/><label for='answer-id-1267807' id='answer-label-1267807' class=' answer'><span>This source address signifies that the originator is using 802dot1x to try and penetrate into Frank's network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324115[]' id='answer-id-1267808' class='answer   answerof-324115 ' value='1267808'   \/><label for='answer-id-1267808' id='answer-label-1267808' class=' answer'><span>This means that the source is using IPv4<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-324116'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident. <br \/>\r<br>Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)<\/div><input type='hidden' name='question_id[]' id='qID_38' value='324116' \/><input type='hidden' id='answerType324116' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324116[]' id='answer-id-1267809' class='answer   answerof-324116 ' value='1267809'   \/><label for='answer-id-1267809' id='answer-label-1267809' class=' answer'><span>Complying with the company's security policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324116[]' id='answer-id-1267810' class='answer   answerof-324116 ' value='1267810'   \/><label for='answer-id-1267810' id='answer-label-1267810' class=' answer'><span>Implementing strong authentication schemes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324116[]' id='answer-id-1267811' class='answer   answerof-324116 ' value='1267811'   \/><label for='answer-id-1267811' id='answer-label-1267811' class=' answer'><span>Implementing a strong password policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324116[]' id='answer-id-1267812' class='answer   answerof-324116 ' value='1267812'   \/><label for='answer-id-1267812' id='answer-label-1267812' class=' answer'><span>Install antivirus software<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-324117'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. <br \/>\r<br>Under which category of an information security policy does AUP fall into?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='324117' \/><input type='hidden' id='answerType324117' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324117[]' id='answer-id-1267813' class='answer   answerof-324117 ' value='1267813'   \/><label for='answer-id-1267813' id='answer-label-1267813' class=' answer'><span>System Specific Security Policy (SSSP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324117[]' id='answer-id-1267814' class='answer   answerof-324117 ' value='1267814'   \/><label for='answer-id-1267814' id='answer-label-1267814' class=' answer'><span>Incident Response Policy (IRP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324117[]' id='answer-id-1267815' class='answer   answerof-324117 ' value='1267815'   \/><label for='answer-id-1267815' id='answer-label-1267815' class=' answer'><span>Enterprise Information Security Policy (EISP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324117[]' id='answer-id-1267816' class='answer   answerof-324117 ' value='1267816'   \/><label for='answer-id-1267816' id='answer-label-1267816' class=' answer'><span>Issue Specific Security Policy (ISSP)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-324118'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. <br \/>\r<br>What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='324118' \/><input type='hidden' id='answerType324118' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324118[]' id='answer-id-1267817' class='answer   answerof-324118 ' value='1267817'   \/><label for='answer-id-1267817' id='answer-label-1267817' class=' answer'><span>You should run the up2date -d -f -u command<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324118[]' id='answer-id-1267818' class='answer   answerof-324118 ' value='1267818'   \/><label for='answer-id-1267818' id='answer-label-1267818' class=' answer'><span>You should run the up2data -u command<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324118[]' id='answer-id-1267819' class='answer   answerof-324118 ' value='1267819'   \/><label for='answer-id-1267819' id='answer-label-1267819' class=' answer'><span>You should run the WSUS -d -f -u command.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324118[]' id='answer-id-1267820' class='answer   answerof-324118 ' value='1267820'   \/><label for='answer-id-1267820' id='answer-label-1267820' class=' answer'><span>You should type the sysupdate -d command<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-324119'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. <br \/>\r<br>What is the first step they should do to create the network vulnerability assessment plan?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='324119' \/><input type='hidden' id='answerType324119' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324119[]' id='answer-id-1267821' class='answer   answerof-324119 ' value='1267821'   \/><label for='answer-id-1267821' id='answer-label-1267821' class=' answer'><span>Their first step is to analyze the data they have currently gathered from the company or interviews.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324119[]' id='answer-id-1267822' class='answer   answerof-324119 ' value='1267822'   \/><label for='answer-id-1267822' id='answer-label-1267822' class=' answer'><span>Their first step is to make a hypothesis of what their final findings will be.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324119[]' id='answer-id-1267823' class='answer   answerof-324119 ' value='1267823'   \/><label for='answer-id-1267823' id='answer-label-1267823' class=' answer'><span>Their first step is to create an initial Executive report to show the management team.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324119[]' id='answer-id-1267824' class='answer   answerof-324119 ' value='1267824'   \/><label for='answer-id-1267824' id='answer-label-1267824' class=' answer'><span>Their first step is the acquisition of required documents, reviewing of security policies and compliance.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-324120'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Management wants to bring their organization into compliance with the ISO standard for information security risk management. <br \/>\r<br>Which ISO standard will management decide to implement?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='324120' \/><input type='hidden' id='answerType324120' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324120[]' id='answer-id-1267825' class='answer   answerof-324120 ' value='1267825'   \/><label for='answer-id-1267825' id='answer-label-1267825' class=' answer'><span>ISO\/IEC 27004<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324120[]' id='answer-id-1267826' class='answer   answerof-324120 ' value='1267826'   \/><label for='answer-id-1267826' id='answer-label-1267826' class=' answer'><span>ISO\/IEC 27002<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324120[]' id='answer-id-1267827' class='answer   answerof-324120 ' value='1267827'   \/><label for='answer-id-1267827' id='answer-label-1267827' class=' answer'><span>ISO\/IEC 27006<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324120[]' id='answer-id-1267828' class='answer   answerof-324120 ' value='1267828'   \/><label for='answer-id-1267828' id='answer-label-1267828' class=' answer'><span>ISO\/IEC 27005<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-324121'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's _________integrity check mechanism provides security against a replay attack<\/div><input type='hidden' name='question_id[]' id='qID_43' value='324121' \/><input type='hidden' id='answerType324121' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324121[]' id='answer-id-1267829' class='answer   answerof-324121 ' value='1267829'   \/><label for='answer-id-1267829' id='answer-label-1267829' class=' answer'><span>CRC-32<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324121[]' id='answer-id-1267830' class='answer   answerof-324121 ' value='1267830'   \/><label for='answer-id-1267830' id='answer-label-1267830' class=' answer'><span>CRC-MAC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324121[]' id='answer-id-1267831' class='answer   answerof-324121 ' value='1267831'   \/><label for='answer-id-1267831' id='answer-label-1267831' class=' answer'><span>CBC-MAC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324121[]' id='answer-id-1267832' class='answer   answerof-324121 ' value='1267832'   \/><label for='answer-id-1267832' id='answer-label-1267832' class=' answer'><span>CBC-32<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-324122'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>John wants to implement a packet filtering firewall in his organization's network. <br \/>\r<br>What TCP\/IP layer does a packet filtering firewall work on?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='324122' \/><input type='hidden' id='answerType324122' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324122[]' id='answer-id-1267833' class='answer   answerof-324122 ' value='1267833'   \/><label for='answer-id-1267833' id='answer-label-1267833' class=' answer'><span>Application layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324122[]' id='answer-id-1267834' class='answer   answerof-324122 ' value='1267834'   \/><label for='answer-id-1267834' id='answer-label-1267834' class=' answer'><span>Network Interface layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324122[]' id='answer-id-1267835' class='answer   answerof-324122 ' value='1267835'   \/><label for='answer-id-1267835' id='answer-label-1267835' class=' answer'><span>TCP layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324122[]' id='answer-id-1267836' class='answer   answerof-324122 ' value='1267836'   \/><label for='answer-id-1267836' id='answer-label-1267836' class=' answer'><span>IP layer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-324123'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS\/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. <br \/>\r<br>What tool could Simon and his administrators implement to accomplish this?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='324123' \/><input type='hidden' id='answerType324123' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324123[]' id='answer-id-1267837' class='answer   answerof-324123 ' value='1267837'   \/><label for='answer-id-1267837' id='answer-label-1267837' class=' answer'><span>Snort is the best tool for their situation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324123[]' id='answer-id-1267838' class='answer   answerof-324123 ' value='1267838'   \/><label for='answer-id-1267838' id='answer-label-1267838' class=' answer'><span>They can implement Wireshark<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324123[]' id='answer-id-1267839' class='answer   answerof-324123 ' value='1267839'   \/><label for='answer-id-1267839' id='answer-label-1267839' class=' answer'><span>They could use Tripwire<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324123[]' id='answer-id-1267840' class='answer   answerof-324123 ' value='1267840'   \/><label for='answer-id-1267840' id='answer-label-1267840' class=' answer'><span>They need to use Nessus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-324124'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. <br \/>\r<br>How will you prioritize these two incidents?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='324124' \/><input type='hidden' id='answerType324124' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324124[]' id='answer-id-1267841' class='answer   answerof-324124 ' value='1267841'   \/><label for='answer-id-1267841' id='answer-label-1267841' class=' answer'><span>Based on approval from management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324124[]' id='answer-id-1267842' class='answer   answerof-324124 ' value='1267842'   \/><label for='answer-id-1267842' id='answer-label-1267842' class=' answer'><span>Based on a first come first served basis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324124[]' id='answer-id-1267843' class='answer   answerof-324124 ' value='1267843'   \/><label for='answer-id-1267843' id='answer-label-1267843' class=' answer'><span>Based on a potential technical effect of the incident<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324124[]' id='answer-id-1267844' class='answer   answerof-324124 ' value='1267844'   \/><label for='answer-id-1267844' id='answer-label-1267844' class=' answer'><span>Based on the type of response needed for the incident<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-324125'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Should not be expensive. <br \/>\r<br>The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. <br \/>\r<br>What RAID level will she suggest?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='324125' \/><input type='hidden' id='answerType324125' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324125[]' id='answer-id-1267845' class='answer   answerof-324125 ' value='1267845'   \/><label for='answer-id-1267845' id='answer-label-1267845' class=' answer'><span>RAID 0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324125[]' id='answer-id-1267846' class='answer   answerof-324125 ' value='1267846'   \/><label for='answer-id-1267846' id='answer-label-1267846' class=' answer'><span>RAID 10<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324125[]' id='answer-id-1267847' class='answer   answerof-324125 ' value='1267847'   \/><label for='answer-id-1267847' id='answer-label-1267847' class=' answer'><span>RAID 3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324125[]' id='answer-id-1267848' class='answer   answerof-324125 ' value='1267848'   \/><label for='answer-id-1267848' id='answer-label-1267848' class=' answer'><span>RAID 1<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-324126'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Which OSI layer does a Network Interface Card (NIC) work on?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='324126' \/><input type='hidden' id='answerType324126' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324126[]' id='answer-id-1267849' class='answer   answerof-324126 ' value='1267849'   \/><label for='answer-id-1267849' id='answer-label-1267849' class=' answer'><span>Physical layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324126[]' id='answer-id-1267850' class='answer   answerof-324126 ' value='1267850'   \/><label for='answer-id-1267850' id='answer-label-1267850' class=' answer'><span>Presentation layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324126[]' id='answer-id-1267851' class='answer   answerof-324126 ' value='1267851'   \/><label for='answer-id-1267851' id='answer-label-1267851' class=' answer'><span>Network layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324126[]' id='answer-id-1267852' class='answer   answerof-324126 ' value='1267852'   \/><label for='answer-id-1267852' id='answer-label-1267852' class=' answer'><span>Session layer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-324127'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a\/an ______for legal advice to defend them against this allegation.<\/div><input type='hidden' name='question_id[]' id='qID_49' value='324127' \/><input type='hidden' id='answerType324127' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324127[]' id='answer-id-1267853' class='answer   answerof-324127 ' value='1267853'   \/><label for='answer-id-1267853' id='answer-label-1267853' class=' answer'><span>PR Specialist<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324127[]' id='answer-id-1267854' class='answer   answerof-324127 ' value='1267854'   \/><label for='answer-id-1267854' id='answer-label-1267854' class=' answer'><span>Attorney<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324127[]' id='answer-id-1267855' class='answer   answerof-324127 ' value='1267855'   \/><label for='answer-id-1267855' id='answer-label-1267855' class=' answer'><span>Incident Handler<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324127[]' id='answer-id-1267856' class='answer   answerof-324127 ' value='1267856'   \/><label for='answer-id-1267856' id='answer-label-1267856' class=' answer'><span>Evidence Manager<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-324128'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns. <br \/>\r<br>Which type of RAM will he select for his RAID system?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='324128' \/><input type='hidden' id='answerType324128' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324128[]' id='answer-id-1267857' class='answer   answerof-324128 ' value='1267857'   \/><label for='answer-id-1267857' id='answer-label-1267857' class=' answer'><span>NVRAM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324128[]' id='answer-id-1267858' class='answer   answerof-324128 ' value='1267858'   \/><label for='answer-id-1267858' id='answer-label-1267858' class=' answer'><span>SDRAM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324128[]' id='answer-id-1267859' class='answer   answerof-324128 ' value='1267859'   \/><label for='answer-id-1267859' id='answer-label-1267859' class=' answer'><span>NAND flash memory<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324128[]' id='answer-id-1267860' class='answer   answerof-324128 ' value='1267860'   \/><label for='answer-id-1267860' id='answer-label-1267860' class=' answer'><span>SRAM<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-324129'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________implementation of a VPN.<\/div><input type='hidden' name='question_id[]' id='qID_51' value='324129' \/><input type='hidden' id='answerType324129' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324129[]' id='answer-id-1267861' class='answer   answerof-324129 ' value='1267861'   \/><label for='answer-id-1267861' id='answer-label-1267861' class=' answer'><span>Full Mesh Mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324129[]' id='answer-id-1267862' class='answer   answerof-324129 ' value='1267862'   \/><label for='answer-id-1267862' id='answer-label-1267862' class=' answer'><span>Point-to-Point Mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324129[]' id='answer-id-1267863' class='answer   answerof-324129 ' value='1267863'   \/><label for='answer-id-1267863' id='answer-label-1267863' class=' answer'><span>Transport Mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324129[]' id='answer-id-1267864' class='answer   answerof-324129 ' value='1267864'   \/><label for='answer-id-1267864' id='answer-label-1267864' class=' answer'><span>Tunnel Mode<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-324130'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. <br \/>\r<br>How will they ensure the authenticity of their emails?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='324130' \/><input type='hidden' id='answerType324130' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324130[]' id='answer-id-1267865' class='answer   answerof-324130 ' value='1267865'   \/><label for='answer-id-1267865' id='answer-label-1267865' class=' answer'><span>Dan will use his public key to encrypt his mails while Alex will use Dan's digital signature to verify the authenticity of the mails.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324130[]' id='answer-id-1267866' class='answer   answerof-324130 ' value='1267866'   \/><label for='answer-id-1267866' id='answer-label-1267866' class=' answer'><span>Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324130[]' id='answer-id-1267867' class='answer   answerof-324130 ' value='1267867'   \/><label for='answer-id-1267867' id='answer-label-1267867' class=' answer'><span>Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324130[]' id='answer-id-1267868' class='answer   answerof-324130 ' value='1267868'   \/><label for='answer-id-1267868' id='answer-label-1267868' class=' answer'><span>Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authencity of the mails.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-324131'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. <br \/>\r<br>Which of following physical security measures should the administrator use?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='324131' \/><input type='hidden' id='answerType324131' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324131[]' id='answer-id-1267869' class='answer   answerof-324131 ' value='1267869'   \/><label for='answer-id-1267869' id='answer-label-1267869' class=' answer'><span>Bollards<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324131[]' id='answer-id-1267870' class='answer   answerof-324131 ' value='1267870'   \/><label for='answer-id-1267870' id='answer-label-1267870' class=' answer'><span>Fence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324131[]' id='answer-id-1267871' class='answer   answerof-324131 ' value='1267871'   \/><label for='answer-id-1267871' id='answer-label-1267871' class=' answer'><span>Video surveillance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324131[]' id='answer-id-1267872' class='answer   answerof-324131 ' value='1267872'   \/><label for='answer-id-1267872' id='answer-label-1267872' class=' answer'><span>Mantrap<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-324132'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. <br \/>\r<br>What IP address class is the network range a part of?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='324132' \/><input type='hidden' id='answerType324132' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324132[]' id='answer-id-1267873' class='answer   answerof-324132 ' value='1267873'   \/><label for='answer-id-1267873' id='answer-label-1267873' class=' answer'><span>Class C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324132[]' id='answer-id-1267874' class='answer   answerof-324132 ' value='1267874'   \/><label for='answer-id-1267874' id='answer-label-1267874' class=' answer'><span>Class A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324132[]' id='answer-id-1267875' class='answer   answerof-324132 ' value='1267875'   \/><label for='answer-id-1267875' id='answer-label-1267875' class=' answer'><span>Class B<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324132[]' id='answer-id-1267876' class='answer   answerof-324132 ' value='1267876'   \/><label for='answer-id-1267876' id='answer-label-1267876' class=' answer'><span>Class D<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-324133'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>Which of the information below can be gained through network sniffing? (Select all that apply)<\/div><input type='hidden' name='question_id[]' id='qID_55' value='324133' \/><input type='hidden' id='answerType324133' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324133[]' id='answer-id-1267877' class='answer   answerof-324133 ' value='1267877'   \/><label for='answer-id-1267877' id='answer-label-1267877' class=' answer'><span>Telnet Passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324133[]' id='answer-id-1267878' class='answer   answerof-324133 ' value='1267878'   \/><label for='answer-id-1267878' id='answer-label-1267878' class=' answer'><span>Syslog traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324133[]' id='answer-id-1267879' class='answer   answerof-324133 ' value='1267879'   \/><label for='answer-id-1267879' id='answer-label-1267879' class=' answer'><span>DNS traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324133[]' id='answer-id-1267880' class='answer   answerof-324133 ' value='1267880'   \/><label for='answer-id-1267880' id='answer-label-1267880' class=' answer'><span>Programming errors<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-324134'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. <br \/>\r<br>Unsuccessful scans and probes are at what severity level?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='324134' \/><input type='hidden' id='answerType324134' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324134[]' id='answer-id-1267881' class='answer   answerof-324134 ' value='1267881'   \/><label for='answer-id-1267881' id='answer-label-1267881' class=' answer'><span>Extreme severity level<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324134[]' id='answer-id-1267882' class='answer   answerof-324134 ' value='1267882'   \/><label for='answer-id-1267882' id='answer-label-1267882' class=' answer'><span>Low severity level<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324134[]' id='answer-id-1267883' class='answer   answerof-324134 ' value='1267883'   \/><label for='answer-id-1267883' id='answer-label-1267883' class=' answer'><span>Mid severity level<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324134[]' id='answer-id-1267884' class='answer   answerof-324134 ' value='1267884'   \/><label for='answer-id-1267884' id='answer-label-1267884' class=' answer'><span>High severity level<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-324135'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP\/IP stack.<\/div><input type='hidden' name='question_id[]' id='qID_57' value='324135' \/><input type='hidden' id='answerType324135' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324135[]' id='answer-id-1267885' class='answer   answerof-324135 ' value='1267885'   \/><label for='answer-id-1267885' id='answer-label-1267885' class=' answer'><span>RARP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324135[]' id='answer-id-1267886' class='answer   answerof-324135 ' value='1267886'   \/><label for='answer-id-1267886' id='answer-label-1267886' class=' answer'><span>ICMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324135[]' id='answer-id-1267887' class='answer   answerof-324135 ' value='1267887'   \/><label for='answer-id-1267887' id='answer-label-1267887' class=' answer'><span>DHCP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324135[]' id='answer-id-1267888' class='answer   answerof-324135 ' value='1267888'   \/><label for='answer-id-1267888' id='answer-label-1267888' class=' answer'><span>ARP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-324136'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. <br \/>\r<br>What type of network security approach is Daniel adopting?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='324136' \/><input type='hidden' id='answerType324136' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324136[]' id='answer-id-1267889' class='answer   answerof-324136 ' value='1267889'   \/><label for='answer-id-1267889' id='answer-label-1267889' class=' answer'><span>Preventative<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324136[]' id='answer-id-1267890' class='answer   answerof-324136 ' value='1267890'   \/><label for='answer-id-1267890' id='answer-label-1267890' class=' answer'><span>Reactive<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324136[]' id='answer-id-1267891' class='answer   answerof-324136 ' value='1267891'   \/><label for='answer-id-1267891' id='answer-label-1267891' class=' answer'><span>Retrospective<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324136[]' id='answer-id-1267892' class='answer   answerof-324136 ' value='1267892'   \/><label for='answer-id-1267892' id='answer-label-1267892' class=' answer'><span>Defense-in-depth<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-324137'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the______framework, as it provides a set of controls over IT and consolidates them to form a framework.<\/div><input type='hidden' name='question_id[]' id='qID_59' value='324137' \/><input type='hidden' id='answerType324137' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324137[]' id='answer-id-1267893' class='answer   answerof-324137 ' value='1267893'   \/><label for='answer-id-1267893' id='answer-label-1267893' class=' answer'><span>RMIS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324137[]' id='answer-id-1267894' class='answer   answerof-324137 ' value='1267894'   \/><label for='answer-id-1267894' id='answer-label-1267894' class=' answer'><span>ITIL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324137[]' id='answer-id-1267895' class='answer   answerof-324137 ' value='1267895'   \/><label for='answer-id-1267895' id='answer-label-1267895' class=' answer'><span>ISO 27007<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324137[]' id='answer-id-1267896' class='answer   answerof-324137 ' value='1267896'   \/><label for='answer-id-1267896' id='answer-label-1267896' class=' answer'><span>COBIT<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-324138'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low\/no cost solution to encrypt emails. <br \/>\r<br>What should James use?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='324138' \/><input type='hidden' id='answerType324138' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324138[]' id='answer-id-1267897' class='answer   answerof-324138 ' value='1267897'   \/><label for='answer-id-1267897' id='answer-label-1267897' class=' answer'><span>James could use PGP as a free option for encrypting the company's emails.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324138[]' id='answer-id-1267898' class='answer   answerof-324138 ' value='1267898'   \/><label for='answer-id-1267898' id='answer-label-1267898' class=' answer'><span>James should utilize the free OTP software package.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324138[]' id='answer-id-1267899' class='answer   answerof-324138 ' value='1267899'   \/><label for='answer-id-1267899' id='answer-label-1267899' class=' answer'><span>James can use MD5 algorithm to encrypt all the emails<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324138[]' id='answer-id-1267900' class='answer   answerof-324138 ' value='1267900'   \/><label for='answer-id-1267900' id='answer-label-1267900' class=' answer'><span>James can enforce mandatory HTTPS in the email clients to encrypt emails<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-324139'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. <br \/>\r<br>The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. <br \/>\r<br>What type of solution does Fred's boss want to implement?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='324139' \/><input type='hidden' id='answerType324139' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324139[]' id='answer-id-1267901' class='answer   answerof-324139 ' value='1267901'   \/><label for='answer-id-1267901' id='answer-label-1267901' class=' answer'><span>Fred's boss wants a NIDS implementation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324139[]' id='answer-id-1267902' class='answer   answerof-324139 ' value='1267902'   \/><label for='answer-id-1267902' id='answer-label-1267902' class=' answer'><span>Fred's boss wants Fred to monitor a NIPS system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324139[]' id='answer-id-1267903' class='answer   answerof-324139 ' value='1267903'   \/><label for='answer-id-1267903' id='answer-label-1267903' class=' answer'><span>Fred's boss wants to implement a HIPS solution.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324139[]' id='answer-id-1267904' class='answer   answerof-324139 ' value='1267904'   \/><label for='answer-id-1267904' id='answer-label-1267904' class=' answer'><span>Fred's boss wants to implement a HIDS solution.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-324140'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. <br \/>\r<br>At what layer of the OSI model does an IPsec tunnel function on?<\/div><input type='hidden' name='question_id[]' id='qID_62' value='324140' \/><input type='hidden' id='answerType324140' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324140[]' id='answer-id-1267905' class='answer   answerof-324140 ' value='1267905'   \/><label for='answer-id-1267905' id='answer-label-1267905' class=' answer'><span>They work on the session layer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324140[]' id='answer-id-1267906' class='answer   answerof-324140 ' value='1267906'   \/><label for='answer-id-1267906' id='answer-label-1267906' class=' answer'><span>They function on either the application or the physical layer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324140[]' id='answer-id-1267907' class='answer   answerof-324140 ' value='1267907'   \/><label for='answer-id-1267907' id='answer-label-1267907' class=' answer'><span>They function on the data link layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324140[]' id='answer-id-1267908' class='answer   answerof-324140 ' value='1267908'   \/><label for='answer-id-1267908' id='answer-label-1267908' class=' answer'><span>They work on the network layer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-324141'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. <br \/>\r<br>What is\/are the reason(s) Alex is suggesting that James use a differential backup? (Select all that apply)<\/div><input type='hidden' name='question_id[]' id='qID_63' value='324141' \/><input type='hidden' id='answerType324141' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324141[]' id='answer-id-1267909' class='answer   answerof-324141 ' value='1267909'   \/><label for='answer-id-1267909' id='answer-label-1267909' class=' answer'><span>Less storage space is required<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324141[]' id='answer-id-1267910' class='answer   answerof-324141 ' value='1267910'   \/><label for='answer-id-1267910' id='answer-label-1267910' class=' answer'><span>Father restoration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324141[]' id='answer-id-1267911' class='answer   answerof-324141 ' value='1267911'   \/><label for='answer-id-1267911' id='answer-label-1267911' class=' answer'><span>Slower than a full backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324141[]' id='answer-id-1267912' class='answer   answerof-324141 ' value='1267912'   \/><label for='answer-id-1267912' id='answer-label-1267912' class=' answer'><span>Faster than a full backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324141[]' id='answer-id-1267913' class='answer   answerof-324141 ' value='1267913'   \/><label for='answer-id-1267913' id='answer-label-1267913' class=' answer'><span>Less expensive than full backup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-324142'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. <br \/>\r<br>What mode of ESP does Jacob need to use to encrypt the IP traffic?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='324142' \/><input type='hidden' id='answerType324142' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324142[]' id='answer-id-1267914' class='answer   answerof-324142 ' value='1267914'   \/><label for='answer-id-1267914' id='answer-label-1267914' class=' answer'><span>He should use ESP in transport mode.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324142[]' id='answer-id-1267915' class='answer   answerof-324142 ' value='1267915'   \/><label for='answer-id-1267915' id='answer-label-1267915' class=' answer'><span>Jacob should utilize ESP in tunnel mode.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324142[]' id='answer-id-1267916' class='answer   answerof-324142 ' value='1267916'   \/><label for='answer-id-1267916' id='answer-label-1267916' class=' answer'><span>Jacob should use ESP in pass-through mode.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324142[]' id='answer-id-1267917' class='answer   answerof-324142 ' value='1267917'   \/><label for='answer-id-1267917' id='answer-label-1267917' class=' answer'><span>He should use ESP in gateway mode<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-324143'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>Kyle, a front office executive, suspects that a Trojan has infected his computer. <br \/>\r<br>What should be his first course of action to deal with the incident?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='324143' \/><input type='hidden' id='answerType324143' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324143[]' id='answer-id-1267918' class='answer   answerof-324143 ' value='1267918'   \/><label for='answer-id-1267918' id='answer-label-1267918' class=' answer'><span>Contain the damage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324143[]' id='answer-id-1267919' class='answer   answerof-324143 ' value='1267919'   \/><label for='answer-id-1267919' id='answer-label-1267919' class=' answer'><span>Disconnect the five infected devices from the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324143[]' id='answer-id-1267920' class='answer   answerof-324143 ' value='1267920'   \/><label for='answer-id-1267920' id='answer-label-1267920' class=' answer'><span>Inform the IRT about the incident and wait for their response<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324143[]' id='answer-id-1267921' class='answer   answerof-324143 ' value='1267921'   \/><label for='answer-id-1267921' id='answer-label-1267921' class=' answer'><span>Inform everybody in the organization about the attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-324144'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of________in order to setup.<\/div><input type='hidden' name='question_id[]' id='qID_66' value='324144' \/><input type='hidden' id='answerType324144' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324144[]' id='answer-id-1267922' class='answer   answerof-324144 ' value='1267922'   \/><label for='answer-id-1267922' id='answer-label-1267922' class=' answer'><span>Four drives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324144[]' id='answer-id-1267923' class='answer   answerof-324144 ' value='1267923'   \/><label for='answer-id-1267923' id='answer-label-1267923' class=' answer'><span>Three drives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324144[]' id='answer-id-1267924' class='answer   answerof-324144 ' value='1267924'   \/><label for='answer-id-1267924' id='answer-label-1267924' class=' answer'><span>Two drives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324144[]' id='answer-id-1267925' class='answer   answerof-324144 ' value='1267925'   \/><label for='answer-id-1267925' id='answer-label-1267925' class=' answer'><span>Six drives<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-324145'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Henry needs to design a backup strategy for the organization with no service level downtime. <br \/>\r<br>Which backup method will he select?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='324145' \/><input type='hidden' id='answerType324145' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324145[]' id='answer-id-1267926' class='answer   answerof-324145 ' value='1267926'   \/><label for='answer-id-1267926' id='answer-label-1267926' class=' answer'><span>Normal backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324145[]' id='answer-id-1267927' class='answer   answerof-324145 ' value='1267927'   \/><label for='answer-id-1267927' id='answer-label-1267927' class=' answer'><span>Warm backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324145[]' id='answer-id-1267928' class='answer   answerof-324145 ' value='1267928'   \/><label for='answer-id-1267928' id='answer-label-1267928' class=' answer'><span>Hot backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324145[]' id='answer-id-1267929' class='answer   answerof-324145 ' value='1267929'   \/><label for='answer-id-1267929' id='answer-label-1267929' class=' answer'><span>Cold backup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-324146'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>James wants to implement certain control measures to prevent denial-of-service attacks against the organization. <br \/>\r<br>Which of the following control measures can help James?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='324146' \/><input type='hidden' id='answerType324146' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324146[]' id='answer-id-1267930' class='answer   answerof-324146 ' value='1267930'   \/><label for='answer-id-1267930' id='answer-label-1267930' class=' answer'><span>Strong passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324146[]' id='answer-id-1267931' class='answer   answerof-324146 ' value='1267931'   \/><label for='answer-id-1267931' id='answer-label-1267931' class=' answer'><span>Reduce the sessions time-out duration for the connection attempts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324146[]' id='answer-id-1267932' class='answer   answerof-324146 ' value='1267932'   \/><label for='answer-id-1267932' id='answer-label-1267932' class=' answer'><span>A honeypot in DMZ<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324146[]' id='answer-id-1267933' class='answer   answerof-324146 ' value='1267933'   \/><label for='answer-id-1267933' id='answer-label-1267933' class=' answer'><span>Provide network-based anti-virus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-324147'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. <br \/>\r<br>What RAID level is John considering to meet this requirement?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='324147' \/><input type='hidden' id='answerType324147' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324147[]' id='answer-id-1267934' class='answer   answerof-324147 ' value='1267934'   \/><label for='answer-id-1267934' id='answer-label-1267934' class=' answer'><span>RAID level 1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324147[]' id='answer-id-1267935' class='answer   answerof-324147 ' value='1267935'   \/><label for='answer-id-1267935' id='answer-label-1267935' class=' answer'><span>RAID level 10<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324147[]' id='answer-id-1267936' class='answer   answerof-324147 ' value='1267936'   \/><label for='answer-id-1267936' id='answer-label-1267936' class=' answer'><span>RAID level 5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324147[]' id='answer-id-1267937' class='answer   answerof-324147 ' value='1267937'   \/><label for='answer-id-1267937' id='answer-label-1267937' class=' answer'><span>RAID level 50<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-324148'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. <br \/>\r<br>Which of the following password cracking techniques is the attacker trying?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='324148' \/><input type='hidden' id='answerType324148' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324148[]' id='answer-id-1267938' class='answer   answerof-324148 ' value='1267938'   \/><label for='answer-id-1267938' id='answer-label-1267938' class=' answer'><span>Bruteforce<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324148[]' id='answer-id-1267939' class='answer   answerof-324148 ' value='1267939'   \/><label for='answer-id-1267939' id='answer-label-1267939' class=' answer'><span>Rainbow table<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324148[]' id='answer-id-1267940' class='answer   answerof-324148 ' value='1267940'   \/><label for='answer-id-1267940' id='answer-label-1267940' class=' answer'><span>Hybrid<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324148[]' id='answer-id-1267941' class='answer   answerof-324148 ' value='1267941'   \/><label for='answer-id-1267941' id='answer-label-1267941' class=' answer'><span>Dictionary<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-324149'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location. <br \/>\r<br>What is the appropriate backup method that <br \/>\r<br>should be implemented?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='324149' \/><input type='hidden' id='answerType324149' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324149[]' id='answer-id-1267942' class='answer   answerof-324149 ' value='1267942'   \/><label for='answer-id-1267942' id='answer-label-1267942' class=' answer'><span>Onsite backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324149[]' id='answer-id-1267943' class='answer   answerof-324149 ' value='1267943'   \/><label for='answer-id-1267943' id='answer-label-1267943' class=' answer'><span>Hot site backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324149[]' id='answer-id-1267944' class='answer   answerof-324149 ' value='1267944'   \/><label for='answer-id-1267944' id='answer-label-1267944' class=' answer'><span>Offsite backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324149[]' id='answer-id-1267945' class='answer   answerof-324149 ' value='1267945'   \/><label for='answer-id-1267945' id='answer-label-1267945' class=' answer'><span>Cloud backup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-324150'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?<\/div><input type='hidden' name='question_id[]' id='qID_72' value='324150' \/><input type='hidden' id='answerType324150' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324150[]' id='answer-id-1267946' class='answer   answerof-324150 ' value='1267946'   \/><label for='answer-id-1267946' id='answer-label-1267946' class=' answer'><span>Water<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324150[]' id='answer-id-1267947' class='answer   answerof-324150 ' value='1267947'   \/><label for='answer-id-1267947' id='answer-label-1267947' class=' answer'><span>Wet chemical<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324150[]' id='answer-id-1267948' class='answer   answerof-324150 ' value='1267948'   \/><label for='answer-id-1267948' id='answer-label-1267948' class=' answer'><span>Dry chemical<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324150[]' id='answer-id-1267949' class='answer   answerof-324150 ' value='1267949'   \/><label for='answer-id-1267949' id='answer-label-1267949' class=' answer'><span>Raw chemical<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-324151'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed. <br \/>\r<br>What type of UPS has Kyle purchased?<\/div><input type='hidden' name='question_id[]' id='qID_73' value='324151' \/><input type='hidden' id='answerType324151' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324151[]' id='answer-id-1267950' class='answer   answerof-324151 ' value='1267950'   \/><label for='answer-id-1267950' id='answer-label-1267950' class=' answer'><span>Kyle purchased a Ferro resonant Standby UP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324151[]' id='answer-id-1267951' class='answer   answerof-324151 ' value='1267951'   \/><label for='answer-id-1267951' id='answer-label-1267951' class=' answer'><span>Kyle purchased a Line-Interactive UPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324151[]' id='answer-id-1267952' class='answer   answerof-324151 ' value='1267952'   \/><label for='answer-id-1267952' id='answer-label-1267952' class=' answer'><span>He has bought a Standby UPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324151[]' id='answer-id-1267953' class='answer   answerof-324151 ' value='1267953'   \/><label for='answer-id-1267953' id='answer-label-1267953' class=' answer'><span>He purchased a True Online UP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-324152'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. <br \/>\r<br>Which access control did Ross implement?<\/div><input type='hidden' name='question_id[]' id='qID_74' value='324152' \/><input type='hidden' id='answerType324152' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324152[]' id='answer-id-1267954' class='answer   answerof-324152 ' value='1267954'   \/><label for='answer-id-1267954' id='answer-label-1267954' class=' answer'><span>Discretionary access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324152[]' id='answer-id-1267955' class='answer   answerof-324152 ' value='1267955'   \/><label for='answer-id-1267955' id='answer-label-1267955' class=' answer'><span>Mandatory access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324152[]' id='answer-id-1267956' class='answer   answerof-324152 ' value='1267956'   \/><label for='answer-id-1267956' id='answer-label-1267956' class=' answer'><span>Non-discretionary access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324152[]' id='answer-id-1267957' class='answer   answerof-324152 ' value='1267957'   \/><label for='answer-id-1267957' id='answer-label-1267957' class=' answer'><span>Role-based access control<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-324153'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and <br \/>\r<br>out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. <br \/>\r<br>What is this type of server called?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='324153' \/><input type='hidden' id='answerType324153' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324153[]' id='answer-id-1267958' class='answer   answerof-324153 ' value='1267958'   \/><label for='answer-id-1267958' id='answer-label-1267958' class=' answer'><span>Bastion host<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324153[]' id='answer-id-1267959' class='answer   answerof-324153 ' value='1267959'   \/><label for='answer-id-1267959' id='answer-label-1267959' class=' answer'><span>Edge transport server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324153[]' id='answer-id-1267960' class='answer   answerof-324153 ' value='1267960'   \/><label for='answer-id-1267960' id='answer-label-1267960' class=' answer'><span>SOCKS hsot<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324153[]' id='answer-id-1267961' class='answer   answerof-324153 ' value='1267961'   \/><label for='answer-id-1267961' id='answer-label-1267961' class=' answer'><span>Session layer firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-324154'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. <br \/>\r<br>What logical area is Larry putting the new email server into?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='324154' \/><input type='hidden' id='answerType324154' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324154[]' id='answer-id-1267962' class='answer   answerof-324154 ' value='1267962'   \/><label for='answer-id-1267962' id='answer-label-1267962' class=' answer'><span>He is going to place the server in a Demilitarized Zone (DMZ)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324154[]' id='answer-id-1267963' class='answer   answerof-324154 ' value='1267963'   \/><label for='answer-id-1267963' id='answer-label-1267963' class=' answer'><span>He will put the email server in an IPsec zone.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324154[]' id='answer-id-1267964' class='answer   answerof-324154 ' value='1267964'   \/><label for='answer-id-1267964' id='answer-label-1267964' class=' answer'><span>Larry is going to put the email server in a hot-server zone.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324154[]' id='answer-id-1267965' class='answer   answerof-324154 ' value='1267965'   \/><label for='answer-id-1267965' id='answer-label-1267965' class=' answer'><span>For security reasons, Larry is going to place the email server in the company's Logical Buffer Zone (LBZ).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-324155'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN\/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. <br \/>\r<br>What type of scan is Cindy attempting here?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='324155' \/><input type='hidden' id='answerType324155' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324155[]' id='answer-id-1267966' class='answer   answerof-324155 ' value='1267966'   \/><label for='answer-id-1267966' id='answer-label-1267966' class=' answer'><span>The type of scan she is usinq is called a NULL scan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324155[]' id='answer-id-1267967' class='answer   answerof-324155 ' value='1267967'   \/><label for='answer-id-1267967' id='answer-label-1267967' class=' answer'><span>Cindy is using a half-open scan to find live hosts on her network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324155[]' id='answer-id-1267968' class='answer   answerof-324155 ' value='1267968'   \/><label for='answer-id-1267968' id='answer-label-1267968' class=' answer'><span>Cindy is attempting to find live hosts on her company's network by using a XMAS scan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324155[]' id='answer-id-1267969' class='answer   answerof-324155 ' value='1267969'   \/><label for='answer-id-1267969' id='answer-label-1267969' class=' answer'><span>She is utilizing a RST scan to find live hosts that are listening on her network.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-324156'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a________identified which helps measure how risky an activity is.<\/div><input type='hidden' name='question_id[]' id='qID_78' value='324156' \/><input type='hidden' id='answerType324156' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324156[]' id='answer-id-1267970' class='answer   answerof-324156 ' value='1267970'   \/><label for='answer-id-1267970' id='answer-label-1267970' class=' answer'><span>Risk Severity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324156[]' id='answer-id-1267971' class='answer   answerof-324156 ' value='1267971'   \/><label for='answer-id-1267971' id='answer-label-1267971' class=' answer'><span>Risk Matrix<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324156[]' id='answer-id-1267972' class='answer   answerof-324156 ' value='1267972'   \/><label for='answer-id-1267972' id='answer-label-1267972' class=' answer'><span>Key Risk Indicator<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324156[]' id='answer-id-1267973' class='answer   answerof-324156 ' value='1267973'   \/><label for='answer-id-1267973' id='answer-label-1267973' class=' answer'><span>Risk levels<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-324157'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. <br \/>\r<br>What are the other f unction(s) of the device? (Select all that apply)<\/div><input type='hidden' name='question_id[]' id='qID_79' value='324157' \/><input type='hidden' id='answerType324157' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324157[]' id='answer-id-1267974' class='answer   answerof-324157 ' value='1267974'   \/><label for='answer-id-1267974' id='answer-label-1267974' class=' answer'><span>Provides access memory, achieving high efficiency<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324157[]' id='answer-id-1267975' class='answer   answerof-324157 ' value='1267975'   \/><label for='answer-id-1267975' id='answer-label-1267975' class=' answer'><span>Assigns user addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324157[]' id='answer-id-1267976' class='answer   answerof-324157 ' value='1267976'   \/><label for='answer-id-1267976' id='answer-label-1267976' class=' answer'><span>Enables input\/output (I\/O) operations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324157[]' id='answer-id-1267977' class='answer   answerof-324157 ' value='1267977'   \/><label for='answer-id-1267977' id='answer-label-1267977' class=' answer'><span>Manages security keys<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-324158'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. <br \/>\r<br>Which of the following Wireshark filters will he use?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='324158' \/><input type='hidden' id='answerType324158' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324158[]' id='answer-id-1267978' class='answer   answerof-324158 ' value='1267978'   \/><label for='answer-id-1267978' id='answer-label-1267978' class=' answer'><span>lcmp.type==0 and icmp.type==16<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324158[]' id='answer-id-1267979' class='answer   answerof-324158 ' value='1267979'   \/><label for='answer-id-1267979' id='answer-label-1267979' class=' answer'><span>lcmp.type==8 or icmp.type==16<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324158[]' id='answer-id-1267980' class='answer   answerof-324158 ' value='1267980'   \/><label for='answer-id-1267980' id='answer-label-1267980' class=' answer'><span>lcmp.type==8 and icmp.type==0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324158[]' id='answer-id-1267981' class='answer   answerof-324158 ' value='1267981'   \/><label for='answer-id-1267981' id='answer-label-1267981' class=' answer'><span>lcmp.type==8 or icmp.type==0<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-324159'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>Harry has successfully completed the vulnerability scanning process and found serious vulnerabilities exist in the organization's network. Identify the vulnerability management phases through which he will proceed to ensure all the detected vulnerabilities are addressed and eradicated. (Select all that apply)<\/div><input type='hidden' name='question_id[]' id='qID_81' value='324159' \/><input type='hidden' id='answerType324159' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324159[]' id='answer-id-1267982' class='answer   answerof-324159 ' value='1267982'   \/><label for='answer-id-1267982' id='answer-label-1267982' class=' answer'><span>Mitigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324159[]' id='answer-id-1267983' class='answer   answerof-324159 ' value='1267983'   \/><label for='answer-id-1267983' id='answer-label-1267983' class=' answer'><span>Assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324159[]' id='answer-id-1267984' class='answer   answerof-324159 ' value='1267984'   \/><label for='answer-id-1267984' id='answer-label-1267984' class=' answer'><span>Verification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-324159[]' id='answer-id-1267985' class='answer   answerof-324159 ' value='1267985'   \/><label for='answer-id-1267985' id='answer-label-1267985' class=' answer'><span>Remediation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-324160'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the______________.<\/div><input type='hidden' name='question_id[]' id='qID_82' value='324160' \/><input type='hidden' id='answerType324160' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324160[]' id='answer-id-1267986' class='answer   answerof-324160 ' value='1267986'   \/><label for='answer-id-1267986' id='answer-label-1267986' class=' answer'><span>Archived data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324160[]' id='answer-id-1267987' class='answer   answerof-324160 ' value='1267987'   \/><label for='answer-id-1267987' id='answer-label-1267987' class=' answer'><span>Deleted data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324160[]' id='answer-id-1267988' class='answer   answerof-324160 ' value='1267988'   \/><label for='answer-id-1267988' id='answer-label-1267988' class=' answer'><span>Data in transit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324160[]' id='answer-id-1267989' class='answer   answerof-324160 ' value='1267989'   \/><label for='answer-id-1267989' id='answer-label-1267989' class=' answer'><span>Backup data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-324161'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>During a security awareness program, management was explaining the various reasons which create threats to network security. <br \/>\r<br>Which could be a possible threat to network security?<\/div><input type='hidden' name='question_id[]' id='qID_83' value='324161' \/><input type='hidden' id='answerType324161' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324161[]' id='answer-id-1267990' class='answer   answerof-324161 ' value='1267990'   \/><label for='answer-id-1267990' id='answer-label-1267990' class=' answer'><span>Configuring automatic OS updates<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324161[]' id='answer-id-1267991' class='answer   answerof-324161 ' value='1267991'   \/><label for='answer-id-1267991' id='answer-label-1267991' class=' answer'><span>Having a web server in the internal network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324161[]' id='answer-id-1267992' class='answer   answerof-324161 ' value='1267992'   \/><label for='answer-id-1267992' id='answer-label-1267992' class=' answer'><span>Implementing VPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324161[]' id='answer-id-1267993' class='answer   answerof-324161 ' value='1267993'   \/><label for='answer-id-1267993' id='answer-label-1267993' class=' answer'><span>Patch management<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-324162'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.<\/div><input type='hidden' name='question_id[]' id='qID_84' value='324162' \/><input type='hidden' id='answerType324162' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324162[]' id='answer-id-1267994' class='answer   answerof-324162 ' value='1267994'   \/><label for='answer-id-1267994' id='answer-label-1267994' class=' answer'><span>Ring<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324162[]' id='answer-id-1267995' class='answer   answerof-324162 ' value='1267995'   \/><label for='answer-id-1267995' id='answer-label-1267995' class=' answer'><span>Mesh<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324162[]' id='answer-id-1267996' class='answer   answerof-324162 ' value='1267996'   \/><label for='answer-id-1267996' id='answer-label-1267996' class=' answer'><span>Bus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324162[]' id='answer-id-1267997' class='answer   answerof-324162 ' value='1267997'   \/><label for='answer-id-1267997' id='answer-label-1267997' class=' answer'><span>Star<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-324163'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. <br \/>\r<br>Which command will John use to enable NetFlow on an interface?<\/div><input type='hidden' name='question_id[]' id='qID_85' value='324163' \/><input type='hidden' id='answerType324163' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324163[]' id='answer-id-1267998' class='answer   answerof-324163 ' value='1267998'   \/><label for='answer-id-1267998' id='answer-label-1267998' class=' answer'><span>Router (Config-if) # IP route - cache flow<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324163[]' id='answer-id-1267999' class='answer   answerof-324163 ' value='1267999'   \/><label for='answer-id-1267999' id='answer-label-1267999' class=' answer'><span>Router# Netmon enable<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324163[]' id='answer-id-1268000' class='answer   answerof-324163 ' value='1268000'   \/><label for='answer-id-1268000' id='answer-label-1268000' class=' answer'><span>Router IP route<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324163[]' id='answer-id-1268001' class='answer   answerof-324163 ' value='1268001'   \/><label for='answer-id-1268001' id='answer-label-1268001' class=' answer'><span>Router# netflow enable<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-86' style=';'><div id='questionWrap-86'  class='   watupro-question-id-324164'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>86. <\/span>Michael decides to view the-----------------to track employee actions on the organization's network.<\/div><input type='hidden' name='question_id[]' id='qID_86' value='324164' \/><input type='hidden' id='answerType324164' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324164[]' id='answer-id-1268002' class='answer   answerof-324164 ' value='1268002'   \/><label for='answer-id-1268002' id='answer-label-1268002' class=' answer'><span>Firewall policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324164[]' id='answer-id-1268003' class='answer   answerof-324164 ' value='1268003'   \/><label for='answer-id-1268003' id='answer-label-1268003' class=' answer'><span>Firewall log<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324164[]' id='answer-id-1268004' class='answer   answerof-324164 ' value='1268004'   \/><label for='answer-id-1268004' id='answer-label-1268004' class=' answer'><span>Firewall settings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324164[]' id='answer-id-1268005' class='answer   answerof-324164 ' value='1268005'   \/><label for='answer-id-1268005' id='answer-label-1268005' class=' answer'><span>Firewall rule set<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-87' style=';'><div id='questionWrap-87'  class='   watupro-question-id-324165'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>87. <\/span>Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. <br \/>\r<br>What type of detection is this network-based IDS system using?<\/div><input type='hidden' name='question_id[]' id='qID_87' value='324165' \/><input type='hidden' id='answerType324165' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324165[]' id='answer-id-1268006' class='answer   answerof-324165 ' value='1268006'   \/><label for='answer-id-1268006' id='answer-label-1268006' class=' answer'><span>This network-based IDS system is using anomaly detection.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324165[]' id='answer-id-1268007' class='answer   answerof-324165 ' value='1268007'   \/><label for='answer-id-1268007' id='answer-label-1268007' class=' answer'><span>This network-based IDS system is using dissimilarity algorithms.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324165[]' id='answer-id-1268008' class='answer   answerof-324165 ' value='1268008'   \/><label for='answer-id-1268008' id='answer-label-1268008' class=' answer'><span>This system is using misuse detection.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324165[]' id='answer-id-1268009' class='answer   answerof-324165 ' value='1268009'   \/><label for='answer-id-1268009' id='answer-label-1268009' class=' answer'><span>This network-based IDS is utilizing definition-based detection.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-88' style=';'><div id='questionWrap-88'  class='   watupro-question-id-324166'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>88. <\/span>Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. <br \/>\r<br>Which type of filter will be used to detect this on the network?<\/div><input type='hidden' name='question_id[]' id='qID_88' value='324166' \/><input type='hidden' id='answerType324166' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324166[]' id='answer-id-1268010' class='answer   answerof-324166 ' value='1268010'   \/><label for='answer-id-1268010' id='answer-label-1268010' class=' answer'><span>Tcp.srcport==7 and udp.srcport==7<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324166[]' id='answer-id-1268011' class='answer   answerof-324166 ' value='1268011'   \/><label for='answer-id-1268011' id='answer-label-1268011' class=' answer'><span>Tcp.srcport==7 and udp.dstport==7<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324166[]' id='answer-id-1268012' class='answer   answerof-324166 ' value='1268012'   \/><label for='answer-id-1268012' id='answer-label-1268012' class=' answer'><span>Tcp.dstport==7 and udp.srcport==7<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324166[]' id='answer-id-1268013' class='answer   answerof-324166 ' value='1268013'   \/><label for='answer-id-1268013' id='answer-label-1268013' class=' answer'><span>Tcp.dstport==7 and udp.dstport==7<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-89' style=';'><div id='questionWrap-89'  class='   watupro-question-id-324167'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>89. <\/span>Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. <br \/>\r<br>What encryption method did Ivan settle on?<\/div><input type='hidden' name='question_id[]' id='qID_89' value='324167' \/><input type='hidden' id='answerType324167' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324167[]' id='answer-id-1268014' class='answer   answerof-324167 ' value='1268014'   \/><label for='answer-id-1268014' id='answer-label-1268014' class=' answer'><span>Ivan settled on the private encryption method.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324167[]' id='answer-id-1268015' class='answer   answerof-324167 ' value='1268015'   \/><label for='answer-id-1268015' id='answer-label-1268015' class=' answer'><span>Ivan settled on the symmetric encryption method.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324167[]' id='answer-id-1268016' class='answer   answerof-324167 ' value='1268016'   \/><label for='answer-id-1268016' id='answer-label-1268016' class=' answer'><span>Ivan settled on the asymmetric encryption method<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324167[]' id='answer-id-1268017' class='answer   answerof-324167 ' value='1268017'   \/><label for='answer-id-1268017' id='answer-label-1268017' class=' answer'><span>Ivan settled on the hashing encryption method<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-90' style=';'><div id='questionWrap-90'  class='   watupro-question-id-324168'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>90. <\/span>Identify the password cracking attempt involving precomputed hash values stored as plaintext and using these to crack the password.<\/div><input type='hidden' name='question_id[]' id='qID_90' value='324168' \/><input type='hidden' id='answerType324168' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324168[]' id='answer-id-1268018' class='answer   answerof-324168 ' value='1268018'   \/><label for='answer-id-1268018' id='answer-label-1268018' class=' answer'><span>Bruteforce<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324168[]' id='answer-id-1268019' class='answer   answerof-324168 ' value='1268019'   \/><label for='answer-id-1268019' id='answer-label-1268019' class=' answer'><span>Rainbow table<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324168[]' id='answer-id-1268020' class='answer   answerof-324168 ' value='1268020'   \/><label for='answer-id-1268020' id='answer-label-1268020' class=' answer'><span>Dictionary<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324168[]' id='answer-id-1268021' class='answer   answerof-324168 ' value='1268021'   \/><label for='answer-id-1268021' id='answer-label-1268021' class=' answer'><span>Hybrid<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-91' style=';'><div id='questionWrap-91'  class='   watupro-question-id-324169'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>91. <\/span>Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. <br \/>\r<br>What should she install to prevent piggybacking?<\/div><input type='hidden' name='question_id[]' id='qID_91' value='324169' \/><input type='hidden' id='answerType324169' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324169[]' id='answer-id-1268022' class='answer   answerof-324169 ' value='1268022'   \/><label for='answer-id-1268022' id='answer-label-1268022' class=' answer'><span>She should install a mantrap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324169[]' id='answer-id-1268023' class='answer   answerof-324169 ' value='1268023'   \/><label for='answer-id-1268023' id='answer-label-1268023' class=' answer'><span>Justine needs to install a biometrics station at each entrance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324169[]' id='answer-id-1268024' class='answer   answerof-324169 ' value='1268024'   \/><label for='answer-id-1268024' id='answer-label-1268024' class=' answer'><span>Justine will need to install a revolving security door<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324169[]' id='answer-id-1268025' class='answer   answerof-324169 ' value='1268025'   \/><label for='answer-id-1268025' id='answer-label-1268025' class=' answer'><span>She should install a Thompson Trapdoor.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-92' style=';'><div id='questionWrap-92'  class='   watupro-question-id-324170'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>92. <\/span>Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and provide free data backup on the server. He should be able to perform data backup and recovery more efficiently with the selected technology. <br \/>\r<br>Which of the following storage technologies best suits Tom's requirements?<\/div><input type='hidden' name='question_id[]' id='qID_92' value='324170' \/><input type='hidden' id='answerType324170' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324170[]' id='answer-id-1268026' class='answer   answerof-324170 ' value='1268026'   \/><label for='answer-id-1268026' id='answer-label-1268026' class=' answer'><span>DAS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324170[]' id='answer-id-1268027' class='answer   answerof-324170 ' value='1268027'   \/><label for='answer-id-1268027' id='answer-label-1268027' class=' answer'><span>PAS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324170[]' id='answer-id-1268028' class='answer   answerof-324170 ' value='1268028'   \/><label for='answer-id-1268028' id='answer-label-1268028' class=' answer'><span>RAID<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324170[]' id='answer-id-1268029' class='answer   answerof-324170 ' value='1268029'   \/><label for='answer-id-1268029' id='answer-label-1268029' class=' answer'><span>NAS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-93' style=';'><div id='questionWrap-93'  class='   watupro-question-id-324171'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>93. <\/span>Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.<\/div><input type='hidden' name='question_id[]' id='qID_93' value='324171' \/><input type='hidden' id='answerType324171' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324171[]' id='answer-id-1268030' class='answer   answerof-324171 ' value='1268030'   \/><label for='answer-id-1268030' id='answer-label-1268030' class=' answer'><span>FHSS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324171[]' id='answer-id-1268031' class='answer   answerof-324171 ' value='1268031'   \/><label for='answer-id-1268031' id='answer-label-1268031' class=' answer'><span>DSSS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324171[]' id='answer-id-1268032' class='answer   answerof-324171 ' value='1268032'   \/><label for='answer-id-1268032' id='answer-label-1268032' class=' answer'><span>OFDM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324171[]' id='answer-id-1268033' class='answer   answerof-324171 ' value='1268033'   \/><label for='answer-id-1268033' id='answer-label-1268033' class=' answer'><span>ISM<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-94' style=';'><div id='questionWrap-94'  class='   watupro-question-id-324172'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>94. <\/span>Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a____________.<\/div><input type='hidden' name='question_id[]' id='qID_94' value='324172' \/><input type='hidden' id='answerType324172' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324172[]' id='answer-id-1268034' class='answer   answerof-324172 ' value='1268034'   \/><label for='answer-id-1268034' id='answer-label-1268034' class=' answer'><span>Default allow<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324172[]' id='answer-id-1268035' class='answer   answerof-324172 ' value='1268035'   \/><label for='answer-id-1268035' id='answer-label-1268035' class=' answer'><span>Default deny<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324172[]' id='answer-id-1268036' class='answer   answerof-324172 ' value='1268036'   \/><label for='answer-id-1268036' id='answer-label-1268036' class=' answer'><span>Default restrict<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324172[]' id='answer-id-1268037' class='answer   answerof-324172 ' value='1268037'   \/><label for='answer-id-1268037' id='answer-label-1268037' class=' answer'><span>Default access<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-95' style=';'><div id='questionWrap-95'  class='   watupro-question-id-324173'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>95. <\/span>You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile users working from laptops on Windows 8. Last week 10 of your company's laptops were stolen from a salesman, while at a conference in Barcelona. These laptops contained proprietary company information. While doing a damage assessment, a news story leaks about a blog post containing information about the stolen laptops and the sensitive information. <br \/>\r<br>What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?<\/div><input type='hidden' name='question_id[]' id='qID_95' value='324173' \/><input type='hidden' id='answerType324173' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324173[]' id='answer-id-1268038' class='answer   answerof-324173 ' value='1268038'   \/><label for='answer-id-1268038' id='answer-label-1268038' class=' answer'><span>You should have used 3DE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324173[]' id='answer-id-1268039' class='answer   answerof-324173 ' value='1268039'   \/><label for='answer-id-1268039' id='answer-label-1268039' class=' answer'><span>You should have implemented the Distributed File System (DFS).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324173[]' id='answer-id-1268040' class='answer   answerof-324173 ' value='1268040'   \/><label for='answer-id-1268040' id='answer-label-1268040' class=' answer'><span>If you would have implemented Pretty Good Privacy (PGP).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324173[]' id='answer-id-1268041' class='answer   answerof-324173 ' value='1268041'   \/><label for='answer-id-1268041' id='answer-label-1268041' class=' answer'><span>You could have implemented the Encrypted File System (EFS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-96' style=';'><div id='questionWrap-96'  class='   watupro-question-id-324174'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>96. <\/span>Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. <br \/>\r<br>Which network topology will help the administrator solve the problem of needing to add new employees and expand?<\/div><input type='hidden' name='question_id[]' id='qID_96' value='324174' \/><input type='hidden' id='answerType324174' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324174[]' id='answer-id-1268042' class='answer   answerof-324174 ' value='1268042'   \/><label for='answer-id-1268042' id='answer-label-1268042' class=' answer'><span>Bus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324174[]' id='answer-id-1268043' class='answer   answerof-324174 ' value='1268043'   \/><label for='answer-id-1268043' id='answer-label-1268043' class=' answer'><span>Star<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324174[]' id='answer-id-1268044' class='answer   answerof-324174 ' value='1268044'   \/><label for='answer-id-1268044' id='answer-label-1268044' class=' answer'><span>Ring<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-324174[]' id='answer-id-1268045' class='answer   answerof-324174 ' value='1268045'   \/><label for='answer-id-1268045' id='answer-label-1268045' class=' answer'><span>Mesh<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-97'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons8441\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"8441\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-05 12:27:55\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1777984075\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"324079:1267661,1267662,1267663,1267664 | 324080:1267665,1267666,1267667,1267668 | 324081:1267669,1267670,1267671,1267672 | 324082:1267673,1267674,1267675,1267676 | 324083:1267677,1267678,1267679,1267680 | 324084:1267681,1267682,1267683,1267684 | 324085:1267685,1267686,1267687,1267688 | 324086:1267689,1267690,1267691,1267692 | 324087:1267693,1267694,1267695,1267696 | 324088:1267697,1267698,1267699,1267700 | 324089:1267701,1267702,1267703,1267704 | 324090:1267705,1267706,1267707,1267708 | 324091:1267709,1267710,1267711,1267712 | 324092:1267713,1267714,1267715,1267716 | 324093:1267717,1267718,1267719,1267720 | 324094:1267721,1267722,1267723,1267724 | 324095:1267725,1267726,1267727,1267728 | 324096:1267729,1267730,1267731,1267732 | 324097:1267733,1267734,1267735,1267736 | 324098:1267737,1267738,1267739,1267740 | 324099:1267741,1267742,1267743,1267744 | 324100:1267745,1267746,1267747,1267748 | 324101:1267749,1267750,1267751,1267752 | 324102:1267753,1267754,1267755,1267756 | 324103:1267757,1267758,1267759,1267760 | 324104:1267761,1267762,1267763,1267764 | 324105:1267765,1267766,1267767,1267768 | 324106:1267769,1267770,1267771,1267772 | 324107:1267773,1267774,1267775,1267776 | 324108:1267777,1267778,1267779,1267780 | 324109:1267781,1267782,1267783,1267784 | 324110:1267785,1267786,1267787,1267788 | 324111:1267789,1267790,1267791,1267792 | 324112:1267793,1267794,1267795,1267796 | 324113:1267797,1267798,1267799,1267800 | 324114:1267801,1267802,1267803,1267804 | 324115:1267805,1267806,1267807,1267808 | 324116:1267809,1267810,1267811,1267812 | 324117:1267813,1267814,1267815,1267816 | 324118:1267817,1267818,1267819,1267820 | 324119:1267821,1267822,1267823,1267824 | 324120:1267825,1267826,1267827,1267828 | 324121:1267829,1267830,1267831,1267832 | 324122:1267833,1267834,1267835,1267836 | 324123:1267837,1267838,1267839,1267840 | 324124:1267841,1267842,1267843,1267844 | 324125:1267845,1267846,1267847,1267848 | 324126:1267849,1267850,1267851,1267852 | 324127:1267853,1267854,1267855,1267856 | 324128:1267857,1267858,1267859,1267860 | 324129:1267861,1267862,1267863,1267864 | 324130:1267865,1267866,1267867,1267868 | 324131:1267869,1267870,1267871,1267872 | 324132:1267873,1267874,1267875,1267876 | 324133:1267877,1267878,1267879,1267880 | 324134:1267881,1267882,1267883,1267884 | 324135:1267885,1267886,1267887,1267888 | 324136:1267889,1267890,1267891,1267892 | 324137:1267893,1267894,1267895,1267896 | 324138:1267897,1267898,1267899,1267900 | 324139:1267901,1267902,1267903,1267904 | 324140:1267905,1267906,1267907,1267908 | 324141:1267909,1267910,1267911,1267912,1267913 | 324142:1267914,1267915,1267916,1267917 | 324143:1267918,1267919,1267920,1267921 | 324144:1267922,1267923,1267924,1267925 | 324145:1267926,1267927,1267928,1267929 | 324146:1267930,1267931,1267932,1267933 | 324147:1267934,1267935,1267936,1267937 | 324148:1267938,1267939,1267940,1267941 | 324149:1267942,1267943,1267944,1267945 | 324150:1267946,1267947,1267948,1267949 | 324151:1267950,1267951,1267952,1267953 | 324152:1267954,1267955,1267956,1267957 | 324153:1267958,1267959,1267960,1267961 | 324154:1267962,1267963,1267964,1267965 | 324155:1267966,1267967,1267968,1267969 | 324156:1267970,1267971,1267972,1267973 | 324157:1267974,1267975,1267976,1267977 | 324158:1267978,1267979,1267980,1267981 | 324159:1267982,1267983,1267984,1267985 | 324160:1267986,1267987,1267988,1267989 | 324161:1267990,1267991,1267992,1267993 | 324162:1267994,1267995,1267996,1267997 | 324163:1267998,1267999,1268000,1268001 | 324164:1268002,1268003,1268004,1268005 | 324165:1268006,1268007,1268008,1268009 | 324166:1268010,1268011,1268012,1268013 | 324167:1268014,1268015,1268016,1268017 | 324168:1268018,1268019,1268020,1268021 | 324169:1268022,1268023,1268024,1268025 | 324170:1268026,1268027,1268028,1268029 | 324171:1268030,1268031,1268032,1268033 | 324172:1268034,1268035,1268036,1268037 | 324173:1268038,1268039,1268040,1268041 | 324174:1268042,1268043,1268044,1268045\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"324079,324080,324081,324082,324083,324084,324085,324086,324087,324088,324089,324090,324091,324092,324093,324094,324095,324096,324097,324098,324099,324100,324101,324102,324103,324104,324105,324106,324107,324108,324109,324110,324111,324112,324113,324114,324115,324116,324117,324118,324119,324120,324121,324122,324123,324124,324125,324126,324127,324128,324129,324130,324131,324132,324133,324134,324135,324136,324137,324138,324139,324140,324141,324142,324143,324144,324145,324146,324147,324148,324149,324150,324151,324152,324153,324154,324155,324156,324157,324158,324159,324160,324161,324162,324163,324164,324165,324166,324167,324168,324169,324170,324171,324172,324173,324174\";\nWatuPROSettings[8441] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 8441;\t    \nWatuPRO.post_id = 88568;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.82072300 1777984075\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(8441);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[476,119],"tags":[10075,17610],"class_list":["post-88568","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker","category-ec-council","tag-312-38-exam-dumps","tag-certified-network-defender-cnd"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/88568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=88568"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/88568\/revisions"}],"predecessor-version":[{"id":88569,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/88568\/revisions\/88569"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=88568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=88568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=88568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}