Question 211

Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?
  • Question 212

    Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.
    Which of the following are the two popular types of buffer overflows?
    Each correct answer represents a complete solution. Choose two.
  • Question 213

    TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.
    Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?
  • Question 214

    Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?
    Each correct answer represents a complete solution. Choose two.
  • Question 215

    Which of the following are countermeasures to prevent unauthorized database access attacks?
    Each correct answer represents a complete solution. Choose all that apply.