Está en la página 1de 1

"According to US federal rules, to present a testimony in a court of law, an exp

ert witness needs to furnish certain information to prove his eligibility. Jason
, a qualified computer forensic expert who has started practicing two years back
, was denied an expert testimony in a computer crime case by the US Court of App
eals for the Fourth Circuit in Richmond, Virginia. Considering the US federal ru
les, what could be the most appropriate reason for the court to reject Jason's e
ligibility as an expert witness?
A. Jason was unable to furnish documents showing four years of previous experien
ce in the field
B. Being a computer forensic expert, Jason is not eligible to present testimony
in a computer crime case
C. Jason was unable to furnish documents to prove that he is a computer forensic
expert
D. Jason was not aware of legal issues involved with computer crimes"
"After attending a CEH security seminar, you make a list of changes you would li
ke to perform on your network to increase its security. One of the first things
you change is to switch the RestrictAnonymous setting from 0 to 1 on your server
s. This, as you were told, would prevent anonymous users from establishing a nul
l session on the server. Using Userinfo tool mentioned at the seminar, you succe
ed in establishing a null session with one of the servers. Why is that?
A. RestrictAnonymous must be set to ""10"" for complete security
B. RestrictAnonymous must be set to ""3"" for complete security
C. RestrictAnonymous must be set to ""2"" for complete security
D. There is no way to always prevent an anonymous null session from establishing
"
"After passing her CEH exam, Carol wants to ensure that her network is completel
y secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet fil
tering firewall. Since all security measures were taken, none of the hosts on he
r network can reach the Internet. Why is that?
A. Statefull firewalls do not work with packet filtering firewalls
B. NAT does not work withstatefull firewalls
C. IPSEC does not work with packet filtering firewalls
D. NAT does not work with IPSEC"
"After passively scanning the network of Department of Defense (DoD), you switch
over to active scanning to identify live hosts on their network. DoD is a lage
organization and should respond to any number of scans. You start an ICMP ping s
weep by sending an IP packet to the broadcast address. Only five hosts responds
to your ICMP pings; definitely not the number of hosts you were expecting. Why d
id this ping sweep only produce a few responses?
A. Only IBM AS/400 will reply to this scan
B. Only Windows systems will reply to this scan
C. A switched network will not respond to packets sent to the broadcast address
D. Only Unix and Unix-like systems will reply to this scan"

También podría gustarte