Exam A
QUESTION 1
DRAG DROP You work as a network engineer at Certkiller .com. Your boss, Miss Certkiller, is interested in Risk Analysis methods. Match the attributes with the appropropiate methods.

A.
B.
C.
D.
Correct Answer:
QUESTION 2
DRAG DROP
You work as a network engineer at Certkiller .com. Your boss, Miss Certkiller, is interested protocol port
numbers. Match the port numbers with the appropropiate protocols.
Use only ports that apply.
A.
B.
C.
D.
Correct Answer:
QUESTION 3
Exhibit:

You work as a network administrator at Certkiller .com. Please study the exhibit carefully.
Assuming the shown data packet is to be protected by AH (Authentication Header) in transport mode,
which of the following correctly describes the packet structure after AH is applied?

A. A
B. B
C. C
D. D
Correct Answer: B QUESTION 4
Exhibit: You work as a network administrator at Certkiller .com. Please study the exhibit carefully. Which of the following is the correct diagram for an IPSec Authentication Header?

A. A
B. B
C. C
D. D
E. E
Correct Answer: A
QUESTION 5
Using FTP passive mode, after the client opens the command channel (port 21) to the FTP server and requests passive mode, what will be the next step?
A. The FTP server sends back an acknowledgement (ACK) to the client
B. The FTP server allocates a port to use for the data client channel and transmit that port number to the client
C. The FTP server opens the data channel to the client usong the port number indicated by the client
D. The FTP client opens the data channel to the FTP server on port 20
E. The FTP client opens the data channel to the FTP server on port 21
Correct Answer: B
QUESTION 6
What does the common criteria standard define?
A. The current list of Common Vulnerabilities and Exposures (CVEs)
B. The US standards for encryption export regulations
C. Tools to suppor the development of pirvotal, forward-looking information system technologies
D. The international standards for evaluating trust in information systems and products
E. The international standards for privacy laws
F. The standards for establishing a security incident response systems
Correct Answer: D
QUESTION 7
What is the size of a Point-to-Point GRE header and Protocol Number of IP Layer?
A. 8 bytes and 74
B. 4 bytes and 47
C. 2 bytes and 71
D. 24 bytes and 1
Correct Answer: B
QUESTION 8
Exhibit:

You work as a network administrator at Certkiller .com. Please study the exhibit carefully. Based on the following partial configuration shown, which statement is true?
A. VLAN 10, the guest vlan is also known as the restricted vlan
B. Clietn without an 802.1x supplicant connecting to port fa0/1 will be assigned to the vlan 10
C. Client connecting to port fa0/1 with an 802.1x supplicant but fials authentication will be assigned to the vlan 10
D. Client Connecting to port fa0/1 with an 802.1x supplicant but fails authentication will be assigned to the vlan 100
Correct Answer: B QUESTION 9
In most buffer overflow attacks, which of the following behavior should be expected?
A. A vulnerability used to overflow the buffer and an exploit used ot run malicious software off of the stack
B. An Exploit used to overflow the buffer and a vulnerability used to run malicious software off of the stack
C. A single crafted packet to overflow the buffer and run malicious software
D. Shell code to exploit the buffer

Correct Answer: A QUESTION 10
Which of the following describes the DHCP “Starvation” attack?
A. Exhaust the address space available on the DHCP servers so an attacker can inject their own DHCP server ot serve addresses for malicious resons
B. Saturate the network with DHCP requests preventing other network services working
C. Inject a DHCP server on the network for the purpose of overflowing DNS servers with bogus learned host names
D. DHCP starvation is the act of sending DHCP response packets for the purpose of overloading layer two CAM tables

Correct Answer: A

Next post The Most Reliable 642-983 Certification To Ensure You 100% Pass From Flydumps