Which of the following is susceptible to a cache poisoning attack?
A
Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)
AB
An organization recently suffered a data breach involving a server that had Transmission Control
Protocol (TCP) port 1433 inadvertently exposed to the Internet. Which of the following services was
vulnerable?
C
Reference:
http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/
DDoSSurveyPaper_20030516_Final.pdf (9)
An automatic vulnerability scan has been performed. Which is the next step of the vulnerability
assessment process?
D
Reference:
https://securityintelligence.com/a-step-by-step-guide-to-vulnerability-assessment/
Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol
(UDP) traffic to a routers broadcast address within a network?
C
While planning a vulnerability assessment on a computer network, which of the following is
essential? (Choose two.)
AC
The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose
two.)
AE
Reference:
https://www.kaspersky.com/blog/krackattack/19798/
To minimize vulnerability, which steps should an organization take before deploying a new Internet
of Things (IoT) device? (Choose two.)
BE
Which of the following are part of the hardening phase of the vulnerability assessment process?
(Choose two.)
AB
Which of the following would MOST likely make a Windows workstation on a corporate network
vulnerable to remote exploitation?
D