Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?A . Linux/Unix computers are easier to compromiseB . Linux/Unix computers are constantly talkingC . Windows computers are constantly talkingD . Windows computers will not respond to idle scansView AnswerAnswer: C
What is a good security method to prevent unauthorized users from "tailgating"?
What is a good security method to prevent unauthorized users from "tailgating"?A . Man trapB . Electronic combination locksC . Pick-resistant locksD . Electronic key systemsView AnswerAnswer: A
What are two common methods used by password cracking software that you can use to obtain the password?
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password...
Why would you want to initiate a DoS attack on a system you are testing?
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network . Why would you want to initiate a DoS attack on a system you are...
What is he testing at this point?
Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command . What is he testing at this point? #include #include int main(int argc, char...
Which organization coordinates computer crimes investigations throughout the United States?
Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the...
In a FAT32 system, a 123 KB file will use how many sectors?
In a FAT32 system, a 123 KB file will use how many sectors?A . 34B . 25C . 11D . 56View AnswerAnswer: B
What countermeasures could he take to prevent DDoS attacks?
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?A . Enable direct broadcastsB . Disable direct broadcastsC . Disable BGPD . Enable BGPView AnswerAnswer: B
Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?
Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?A . bench warrantB . wire tapC . subpoenaD . search warrantView AnswerAnswer: D
In the context of file deletion process, which of the following statement holds true?
In the context of file deletion process, which of the following statement holds true?A . When files are deleted, the data is overwritten and the cluster marked as availableB . The longer a disk is in use, the less likely it is that deleted files will be overwrittenC . While...