Question 11

What operating system would respond to the following command?
  • Question 12

    Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11 standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for every____________.
  • Question 13

    You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong.
    When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?
  • Question 14

    Which of the following Linux command searches through the current processes and lists the process IDs those match the selection criteria to stdout?
  • Question 15

    In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe.
    Bootvid.dll. Hal.dll, and boot-start device drivers?