You are introducing a co-worker to the security systems in place in your organization. Early in the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP?
Answer : D
You are setting the permissions on a new file in Linux. What will be the level of permission given to the user if you assign an Octal value of 6?
Answer : B
Your organization has created a multicast application that sends out sales reports to all the salespeople on a weekly basis. You are running a network sniffer to capture multicast packets during the testing of the application. Which IP address range is reserved for Multicast?
Answer : A
You are in the process of securing several new machine on your Windows 2000 network. To help with the process Microsoft has defined a set of Security Templates to use in various situations. Which of the following best describes the Compatible Security Template?
Answer : B
Which of the following represent an IPv6 address?
Answer : B
In the last few days, users have reported to you that they have each received two emails from an unknown source with file attachments. Fortunately the users have listened to your training and no one has run the attached program. You study the attachment on an isolated computer and find that it is a program that is designed to execute a payload when the system clock registers 10:10 PM on February 29. Which of the following best identifies the type of program is the attachment?
Answer : B
Your network has been hit by a very bad virus recently. As you tracked the virus through the network, it was changing from system, to system. Each time it went to infect a system; it had evolved slightly to have a different file size, or different file structure. After extensive work, you and your team were able to isolate and remove the virus from the network. Which of the following best identifies the type of virus that was in your network?
Answer : E