You are watching: Which of the following statements correctly describes the malware characteristic of polymorphism?

(Solved) : inquiry 61 Using covering Tree Protocol first Step picking Paths Network Stp need to Firs Q42285014 . . .
$9.00
Question 61
When using extending Tree Protocol, what is the first step inselecting courses through a network?
a.
STP must an initial select the source bridge, or grasp bridge.
b.
STP disables links that are not part of a shortest path.
c.
STP examines the possible paths in between all other bridges.
d.
STP starts to block BPDUs top top non-designated ports.
1.25 points
Question 62
When using spanning Tree Protocol, which harbor on non-rootbridges deserve to forward traffic toward the source bridge?
a.
Only one root port, i m sorry is the bridge’s port that is furthestfrom the root bridge, have the right to forward.
b.
All ports have the right to forward frames to the source bridge, listed theyare not in a down state.
c.
Only one root port, which is the bridge’s port that is closestto the source bridge, have the right to forward.
d.
All ports will certainly forward frames to the root bridge, uneven a BPDUis received earlier on that very same port.
1.25 points
Question 63
When using a host-based intrusion detection system, whatadditional feature can be available to alert the mechanism of anychanges make to files that shouldn’t change?
a.
file integrity security (FIM)
b.
file access auditing (FAA)
c.
file checksum the town hall (FCW)
d.
file adjust management (FCM)
1.25 points
Question 64
When using Kerberos, an accessibility granting ticket is the sameas a key.
True
False
1.25 points
Question 65
Where would restrictions about what individuals can and cannot dowhile accessing a network’s resources be found?
a.
acceptable use plan document
b.
non-disclosure commitment document
c.
terms of organization document
d.
license limitations document
1.25 points
Question 66
Which adaptation the EAP uses EAP-MSCHAPv2 inside of anencrypted TLS tunnel?
a.
EAP-FAST
b.
LEAP
c.
EAP-TLS
d.
Protected EAP (PEAP)
1.25 points
Question 67
Which command have the right to be provided on a Windows mechanism to produce a hashof a file?
a.
Get-FileHash
b.
md5
c.
shasum
d.
Compute-FileHash
1.25 points
Question 68
Which encryption traditional was initially utilized v WPA’sTKIP?
a.
Rivest Cipher 4 (RC4)
b.
Blowfish
c.
Advanced Encryption standard (AES)
d.
Data Encryption typical (DES)
1.25 points
Question 69
Which heritage authentication protocol needs mutualauthentication?
a.
Challenge Handshake Authentication Protocol (CHAP)
b.
Password Authentication Protocol (PAP)
c.
Microsoft challenge Handshake Authentication Protocol(MS-CHAP)
d.
Microsoft an obstacle Handshake Authentication Protocol, variation 2(MS-CHAPv2)
1.25 points
Question 70
Which of the adhering to is an instance of proxy serversoftware?
a.
Snort
b.
Squid
c.
BIND
d.
Apache
1.25 points
Question 71
Which of the adhering to scenarios represents a phishingattempt?
a.
An e-mail was sent out to a manager at your firm that showed up tobe from the company’s CTO, asking for access.
b.
A human being posing together an employee do the efforts to access a secured area atyour organization.
c.
An employee at your firm has received a malware-infected filein your e-mail.
d.
A gift was available to one employee with accessibility to securedinformation in exchange because that details.
1.25 points
Question 72
Which that the adhering to scenarios would certainly necessitate the usage of anon-disclosure agreement?
a.
Your firm would like to permit employees to carry their owndevices.
b.
Your company needs come impose password constraints on new usersin the network.
c.
Your firm wishes come educate individuals on the suitable use that thenetwork.
d.
Your firm needs to avoid a new contractor indigenous sharinginformation through a potential competitor.
1.25 points
Question 73
Which the the following statements correctly defines themalware properties of polymorphism?
a.
Polymorphic malware uses encryption to preventdetection.
b.
Polymorphic malware can change its qualities every time itis moved to a new system.
c.
Polymorphic malware is designed to activate ~ above a particulardate, remaining harmless till that time.
d.
Polymorphic malware is software that disguises itself as alegitimate program, or replace instead replace a legitimate program’s code withdestructive code.
1.25 points
Question 74
Which of the complying with statements defines a worm?
a.
A regime that runs separately of other software and also travelsbetween computer systems and across networks.
b.
A process that operation automatically, there is no requiring a human tostart or protect against it.
c.
A regime that disguises itself as something advantageous but actuallyharms your system.
d.
A regime that locks a user’s data or computer system until aransom is paid.
1.25 points
Question 75
Which the the adhering to terms is offered to explain theconfiguration the a port to copy all website traffic passing through theswitch to the machine at the other end of the port?
a.
port shadowing
b.
port mirroring
c.
port supertrunking
d.
port lurking
1.25 points
Question 76
Which that the following utilities performs sophisticatedvulnerability scans, and can recognize unencrypted data together ascredit map numbers?
a.
Nessus
b.
L0phtcrack
c.
Metasploit
d.
Nmap
1.25 points
Question 77
Which protocol design to replace STP operates at Layer 3 ofthe OSI model?
a.
Rapid spanning Tree Protocol (RSTP)
b.
Multiple spanning Tree Protocol (MSTP)
c.
Shortest course Bridging (SPB)
d.
Transparent Interconnection of too many of links (TRILL)
1.25 points
Question 78
Which form of DoS assault involves an attack that is bounced offuninfected computers before being command at the target?
a.
cached denial-of-service attack
b.
distributed enjoy denial-of-service attack
c.
permanent denial-of-service attack
d.
distributed denial-of-service attack
1.25 points
Question 79
You have actually been inquiry by your premium to configure all Cisconetwork switches to enable only agree MAC addresses throughswitch access ports. Just how is this accomplished?
a.
Use the switchport port-security command to allow MACfiltering.
b.
Use the secure port mac-address command to border the harbor tolearned addresses only.
c.
Use the allowed-mac command come filter by MAC address.
d.
Use the mac-limit command come prevent an ext than one MAC frombeing accepted.
1.25 points
Question 80
You have actually been tasked through the configuration of a Juniper switch,and have been told to restrict the number of MAC addresses allowedin the MAC deal with table. What command should you use?
a.
mac-limit
b.
mac-address limit
c.
See more: Earthworm Anatomy Worksheet, Earthworm Dissection With Answers
set max-mac
d.
set total-macs
expert Answer
answer to inquiry 61 when using spanning Tree Protocol, what is the first step in selecting paths through a network? a. STP need to …