Home/(Solved) : question 61 Using spanning Tree Protocol first Step picking Paths Network Stp need to Firs Q42285014 . . .

You are watching: Which of the following statements correctly describes the malware characteristic of polymorphism?


*

(Solved) : inquiry 61 Using covering Tree Protocol first Step picking Paths Network Stp need to Firs Q42285014 . . .

$9.00


Question 61

When using extending Tree Protocol, what is the first step inselecting courses through a network?

a.

STP must an initial select the source bridge, or grasp bridge.

b.

STP disables links that are not part of a shortest path.

c.

STP examines the possible paths in between all other bridges.

d.

STP starts to block BPDUs top top non-designated ports.

1.25 points

Question 62

When using spanning Tree Protocol, which harbor on non-rootbridges deserve to forward traffic toward the source bridge?

a.

Only one root port, i m sorry is the bridge’s port that is furthestfrom the root bridge, have the right to forward.

b.

All ports have the right to forward frames to the source bridge, listed theyare not in a down state.

c.

Only one root port, which is the bridge’s port that is closestto the source bridge, have the right to forward.

d.

All ports will certainly forward frames to the root bridge, uneven a BPDUis received earlier on that very same port.

1.25 points

Question 63

When using a host-based intrusion detection system, whatadditional feature can be available to alert the mechanism of anychanges make to files that shouldn’t change?

a.

file integrity security (FIM)

b.

file access auditing (FAA)

c.

file checksum the town hall (FCW)

d.

file adjust management (FCM)

1.25 points

Question 64

When using Kerberos, an accessibility granting ticket is the sameas a key.

True

False

1.25 points

Question 65

Where would restrictions about what individuals can and cannot dowhile accessing a network’s resources be found?

a.

acceptable use plan document

b.

non-disclosure commitment document

c.

terms of organization document

d.

license limitations document

1.25 points

Question 66

Which adaptation the EAP uses EAP-MSCHAPv2 inside of anencrypted TLS tunnel?

a.

EAP-FAST

b.

LEAP

c.

EAP-TLS

d.

Protected EAP (PEAP)

1.25 points

Question 67

Which command have the right to be provided on a Windows mechanism to produce a hashof a file?

a.

Get-FileHash

b.

md5

c.

shasum

d.

Compute-FileHash

1.25 points

Question 68

Which encryption traditional was initially utilized v WPA’sTKIP?

a.

Rivest Cipher 4 (RC4)

b.

Blowfish

c.

Advanced Encryption standard (AES)

d.

Data Encryption typical (DES)

1.25 points

Question 69

Which heritage authentication protocol needs mutualauthentication?

a.

Challenge Handshake Authentication Protocol (CHAP)

b.

Password Authentication Protocol (PAP)

c.

Microsoft challenge Handshake Authentication Protocol(MS-CHAP)

d.

Microsoft an obstacle Handshake Authentication Protocol, variation 2(MS-CHAPv2)

1.25 points

Question 70

Which of the adhering to is an instance of proxy serversoftware?

a.

Snort

b.

Squid

c.

BIND

d.

Apache

1.25 points

Question 71

Which of the adhering to scenarios represents a phishingattempt?

a.

An e-mail was sent out to a manager at your firm that showed up tobe from the company’s CTO, asking for access.

b.

A human being posing together an employee do the efforts to access a secured area atyour organization.

c.

An employee at your firm has received a malware-infected filein your e-mail.

d.

A gift was available to one employee with accessibility to securedinformation in exchange because that details.

1.25 points

Question 72

Which that the adhering to scenarios would certainly necessitate the usage of anon-disclosure agreement?

a.

Your firm would like to permit employees to carry their owndevices.

b.

Your company needs come impose password constraints on new usersin the network.

c.

Your firm wishes come educate individuals on the suitable use that thenetwork.

d.

Your firm needs to avoid a new contractor indigenous sharinginformation through a potential competitor.

1.25 points

Question 73

Which the the following statements correctly defines themalware properties of polymorphism?

a.

Polymorphic malware uses encryption to preventdetection.

b.

Polymorphic malware can change its qualities every time itis moved to a new system.

c.

Polymorphic malware is designed to activate ~ above a particulardate, remaining harmless till that time.

d.

Polymorphic malware is software that disguises itself as alegitimate program, or replace instead replace a legitimate program’s code withdestructive code.

1.25 points

Question 74

Which of the complying with statements defines a worm?

a.

A regime that runs separately of other software and also travelsbetween computer systems and across networks.

b.

A process that operation automatically, there is no requiring a human tostart or protect against it.

c.

A regime that disguises itself as something advantageous but actuallyharms your system.

d.

A regime that locks a user’s data or computer system until aransom is paid.

1.25 points

Question 75

Which the the adhering to terms is offered to explain theconfiguration the a port to copy all website traffic passing through theswitch to the machine at the other end of the port?

a.

port shadowing

b.

port mirroring

c.

port supertrunking

d.

port lurking

1.25 points

Question 76

Which that the following utilities performs sophisticatedvulnerability scans, and can recognize unencrypted data together ascredit map numbers?

a.

Nessus

b.

L0phtcrack

c.

Metasploit

d.

Nmap

1.25 points

Question 77

Which protocol design to replace STP operates at Layer 3 ofthe OSI model?

a.

Rapid spanning Tree Protocol (RSTP)

b.

Multiple spanning Tree Protocol (MSTP)

c.

Shortest course Bridging (SPB)

d.

Transparent Interconnection of too many of links (TRILL)

1.25 points

Question 78

Which form of DoS assault involves an attack that is bounced offuninfected computers before being command at the target?

a.

cached denial-of-service attack

b.

distributed enjoy denial-of-service attack

c.

permanent denial-of-service attack

d.

distributed denial-of-service attack

1.25 points

Question 79

You have actually been inquiry by your premium to configure all Cisconetwork switches to enable only agree MAC addresses throughswitch access ports. Just how is this accomplished?

a.

Use the switchport port-security command to allow MACfiltering.

b.

Use the secure port mac-address command to border the harbor tolearned addresses only.

c.

Use the allowed-mac command come filter by MAC address.

d.

Use the mac-limit command come prevent an ext than one MAC frombeing accepted.

1.25 points

Question 80

You have actually been tasked through the configuration of a Juniper switch,and have been told to restrict the number of MAC addresses allowedin the MAC deal with table. What command should you use?

a.

mac-limit

b.

mac-address limit

c.

See more: Earthworm Anatomy Worksheet, Earthworm Dissection With Answers

set max-mac

d.

set total-macs

expert Answer

answer to inquiry 61 when using spanning Tree Protocol, what is the first step in selecting paths through a network? a. STP need to …