Which of the following is/are indicator(s) of compromise?
Yara signature |
||
IP address |
||
Command and Control Domain |
||
Malware hash value |
Which of the following is/are indicator(s) of compromise?
Answer:- Command and Control Domain , Malware hash value
Which of the following is/are indicator(s) of compromise? Yara signature IP address Command and Control Domain...
Which of the following utilities could be used to resolve an IP address to a domain name, assuming the address has a PTR record? (choose one and why) ifconfig ping arp nbtstat
Which of the following utilities could be used to resolve an IP address to a domain name, assuming the address has a PTR record? (choose one and why) A. ifconfig B. ping C. arp D. nbtstat
Which TCP/IP Application layer protocol provides IP address resolution for domain names? A. DHCP B. DNS C. SMTP D. SNMP
Which of the following is (are) sign(s) of C2 (command & control) traffic outbound from a network? a. Connection to a specific domain regularly in exactly same time intervals. b. Lower count of HTTP GET requests with unique User-Agent within header. c. HTTP traffic to destination with expired or revoked SSL Certificate. d. All of the above.
Final Exam CSIT 340 Computer Networks, Fail 2015 wants to know the iP address of amaron.com and sends a query to for the domain name server that the local domain name server will (a) if a local domain STuR what is tsv name contact next? What à the iP address of this domain name sends a query to SRVR name server will contact ir ides 27.oo. 173. s (b) if a loral domain name server wants to know the IP...
Step 2. Basic IP addressing. Task: Use the IP address chart and your knowledge of IP address classes to answer the following questions l. What is the decimal and binary range of the first octet of all possible Class B IP addresses? Decimal: From: To: Binary: 2. Which octet(s) represent the network portion of a Class C IP address? 3. Which octet(s) represent the host portion of a Class A IP address? Io: Step 3. Determine the host and network...
29. Consider the following LAN with one Ether switch S, one intra-domain router R, and two hosts X and Y Assume switch S has been just powered on. 1. Describe the routing and address resolution steps performed at X, Y, and S when X sends an IP packet to Y. 2. Describe the routing and address resolution steps performed at X, Y, and S when Y replies an IP packet to X. 3. Describe the routing and address resolution steps...
Which of the following is considered to be a private IP address range? 100.0.0.0 – 100.255.255.255 178.160.0.0 – 178.160.31.255 192.168.0.0 – 192.168.255.255 All of the above Which of the following is considered to be a Private IP address range? A. 1.0.0.0 – 126.0.0.0 B. 128 - 191 C. 10.0.0.0 – 10.255.255.255 D. 168.192.0.0 – 168.192.255.255 E. 192 - 223
Which of the following is a valid IP address to configure a computer with? A. 238.1.2.3 /24 B. 172.16.256.1 /24 C. 172.16.10.0 255.255.252.0 D. 172.16.0.0 /16
A/ Given the following IP address from the Class B address range using the default subnet mask: 100.110.0.0. Your network plan requires no more than 64 hosts on a subnet. When you configure the IP address in Cisco IOS software, which value should you use as the subnet mask? 255.255.0.0 255.255.128.0 255.255.255.128 255.255.255.252 B/ Identify how many valid host addresses can you have on 192.168.27.32 network with a subnet mask of 255.255.255.240. (2^4) - 2 (2^3) – 2 (2^2)...