In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
The system enters ROM monitor mode if the user interrupts the boot sequence or if the router does not find a valid operating system image. ROM monitor mode is used to perform diagnostic tests or to boot the device. If the router does not have a configuration file, it will enter Setup mode to create an initial configuration. Setting operating parameters is done in Privileged EXEC mode.
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
The Source Port Address is a 16-bit field in the TCP header that identifies the source port number of the application program in the host that is sending the segment. This field helps the receiving system know which application on the sender’s system sent the data. Other fields such as the Sequence Number, Header Length, and Acknowledgment Number have different purposes related to data sequencing, header length specification, and acknowledgment of received data, respectively.
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
PSAD (Port Scan Attack Detector) is a tool that analyzes iptables log messages to detect port scans and other suspicious traffic. While it is traditionally run on Linux, it can also be configured to work on a Windows environment using tools like Cygwin or WSL (Windows Subsystem for Linux). PSAD includes many intrusion detection signatures and can alert for various network attack patterns.
Which of the following cables is made of glass or plastic and transmits signals in the form of light?
D
Fiber optic cable is also known as optical fiber. It is made of glass or plastic and transmits signals in the form of light. It is of cylindrical shape and consists of three concentric sections: the core, the cladding, and the jacket. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference and the need to retransmit signals. Most telephone company's long-distance lines are now made of optical fiber. Transmission over an optical fiber cable requires repeaters at distance intervals. The glass fiber requires more protection within an outer cable than copper.
Answer option B is incorrect. Twisted pair cabling is a type of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources. It consists of the following twisted pair cables:
Shielded Twisted Pair: Shielded Twisted Pair (STP) is a special kind of copper telephone wiring used in some business installations. An outer covering or shield is added to the ordinary twisted pair telephone wires; the shield functions as a ground. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. Shielded twisted pair is often used in business installations. Unshielded Twisted Pair: Unshielded Twisted Pair
(UTP) is the ordinary wire used in home. UTP cable is also the most common cable used in computer networking. Ethernet, the most common data networking standard, utilizes UTP cables. Twisted pair cabling is often used in data networks for short and medium length connections because of its relatively lower costs compared to optical fiber and coaxial cable.UTP is also finding increasing use in video applications, primarily in security cameras. Many middle to high-end cameras include a UTP output with setscrew terminals. This is made possible by the fact that UTP cable bandwidth has improved to match the baseband of television signals.
Answer option A is incorrect. Coaxial cable is the kind of copper cable used by cable TV companies between the community antenna and user homes and businesses. Coaxial cable is sometimes used by telephone companies from their central office to the telephone poles near users. It is also widely installed for use in business and corporation Ethernet and other types of local area network. Coaxial cable is called "coaxial" because it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis. The outer channel serves as a ground. Many of these cables or pairs of coaxial tubes can be placed in a single outer sheathing and, with repeaters, can carry information for a great distance. It is shown in the figure below:
Answer option C is incorrect. Plenum cable is cable that is laid in the plenum spaces of buildings. The plenum is the space that can facilitate air circulation for heating and air conditioning systems, by providing pathways for either heated/conditioned or return airflows. Space between the structural ceiling and the dropped ceiling or under a raised floor is typically considered plenum. However, some drop ceiling designs create a tight seal that does not allow for airflow and therefore may not be considered a plenum air-handling space. The plenum space is typically used to house the communication cables for the building's computer and telephone network.
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
A high-interaction honeypot provides an attacker access to the real operating system without any restriction, thus collecting a vast amount of information about the attacker. This type of honeypot is useful for detailed and comprehensive data gathering, including the attacker's behaviors, tools, and communication methods. Unlike low or medium-interaction honeypots, which offer limited interaction and do not provide full access to the underlying operating system, high-interaction honeypots go even further by allowing full OS access, increasing the fidelity and quantity of captured data.