1.
Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports?
2.
Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?
3.
What is the following command used for? net use \targetipc$ "" /u:""
4.
What is the proper response for a NULL scan if the port is closed?
5.
One of your team members has asked you to analyze the following SOA record. What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.
6.
One of your team members has asked you to analyze the following SOA record. What is the version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.
7.
MX record priority increases as the number increases. (True/False.
8.
Which of the following tools can be used to perform a zone transfer?
9.
Real 285 EC-Council EC0-350 Exam Under what conditions does a secondary name server request a zone transfer from a primary name server?
10.
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.