If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?
If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?A . -sPB . -PC . -rD . -FView AnswerAnswer: B
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.A . My DoomB . AstacheldrahtC . R-U-Dead-Yet?(RUDY)D . LOICView AnswerAnswer:...
Which of the following is the most useful for quick validation?
You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?A . Double quotationB . BackslashC . SemicolonD . Single quotationView AnswerAnswer: D
In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?
A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?A . LibpcapB . AwinpcapC . WinpromD . WinpcapView AnswerAnswer: D
What is the main security service a cryptographic hash provides?
What is the main security service a cryptographic hash provides?A . Integrity and ease of computationB . Message authentication and collision resistanceC . Integrity and collision resistanceD . Integrity and computational in-feasibilityView AnswerAnswer: D
Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Port securityB . A Layer 2 Attack Prevention Protocol (LAPP)C . Dynamic ARP inspection (DAI)D . Spanning treeView AnswerAnswer: C
What is the recommended architecture in terms of server placement?
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?A . All three servers need to be placed internallyB . A web server facing...
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....
Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?
Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the...
What type of vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?
What type of vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?A . Cross-site request forgeryB . Cross-site scriptingC . Session hijackingD . Server side request forgeryView AnswerAnswer: A