Question 66
Which of the following network scanning tools is a TCP/UDP port scanner that works as a ping sweeper and hostname resolver?
Question 67
Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?
Question 68
Bryson is the IT manager and sole IT employee working for a federal agency in Californi a. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?
Question 69
FILL BLANK
Fill in the blank with the appropriate term. The ___________ protocol is a feature of packet-based data
transmission protocols. It is used to keep a record of the frame sequences sent and their respective
acknowledgements received by both the users.
Question 70
Which of the following is a high-speed network that connects computers, printers, and other network devices together?