What is the role of test automation in security testing?
What is the role of test automation in security testing?A . It is an option but it tends to be very expensive.B . It should be used exclusively. Manual testing is outdated because of low spend and possible test setup inconsistencies.C . Test automation is not usable in security due...
Which of the following has occurred?
A technician is re soling an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they...
Which of the following is considered as one of the most reliable forms of TCP scanning?
Which of the following is considered as one of the most reliable forms of TCP scanning?A . TCP Connect/Full Open ScanB . Half-open ScanC . NULL ScanD . Xmas ScanView AnswerAnswer: A
What is the minimum number of network connections in a multihomed firewall?
What is the minimum number of network connections in a multihomed firewall?A . 3B . 2C . 5D . 4View AnswerAnswer: B
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the pubic network and the payment card data.B . Use encryption to protect all transmission of cardholder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D . Limit...
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner's permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . IPsecB . SFTPC . FTPSD . SSLView AnswerAnswer: A
What do you want to “know" to prove yourself that it was Bob who had send a mail?
Bob, your senior colleague, has sent you a mail regarding a a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to “know" to prove yourself that...
The "Gray-box testing" methodology enforces what kind of restriction?
The "Gray-box testing" methodology enforces what kind of restriction?A . Only the internal operation of a system is known to the tester.B . The internal operation of a system is completely known to the tester.C . The internal operation of a system is only partly accessible to the testerD ....
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?A . ScalabilityB . SpeedC . Key distributionD . SecurityView AnswerAnswer: B