10/613 questions · Unlock full access
Q1

What is the broadcast address for the subnet 190.86.168.0/22?

Q2

A server has been infected by a certain type of Trojan. The hacker intended to utilize it to send and host junk mails. What type of Trojan did the hacker use?

Q3

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

Q4

ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.

Question image
Q5

A botnet can be managed through which of the following?

Q6

If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?

Q7

By using a smart card and pin, you are using a two-factor authentication that satisfies

Q8

An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?

Q9

What information should an IT system analysis provide to the risk assessor?

Q10

Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting