system very easy?

The Heart bleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160.This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520. What type of key does this bug leave exposed to the Internet making...

October 3, 2021 No Comments READ MORE +

The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

Jim's company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim's company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from...

October 2, 2021 No Comments READ MORE +

How can he use it?

A hacker has managed to gain access to a Linux host and stolen the password file from/etc/passwd. How can he use it?A . The file reveals the passwords to the root user only.B . The password file does not contain the passwords themselves.C . He cannot read it because it...

October 2, 2021 No Comments READ MORE +

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?A . Produces less false positivesB . Can identify unknown attacksC . Requires vendor updates for a new threatD . Cannot deal with encrypted network trafficView AnswerAnswer: B

October 2, 2021 No Comments READ MORE +

PGP, SSL, and IKE are all examples of which type of cryptography?

PGP, SSL, and IKE are all examples of which type of cryptography?A . Hash AlgorithmB . DigestC . Secret KeyD . Public KeyView AnswerAnswer: D

October 2, 2021 No Comments READ MORE +

What is the purpose of a demilitarized zone on a network?

What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...

October 2, 2021 No Comments READ MORE +

What is the best Nmap command you will use?

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use?A . nmap -T4 -q 10.10.0.0/ 24B . nmap -T4 -F 10.10.0.0/ 24C . nmap -T4 -r 10.10.1.0/...

October 1, 2021 No Comments READ MORE +

What sort of security breach is this policy attempting to mitigate?

A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?A . Attempts by attackers to access the user and password information stored in the company'sB . Attempts by attackers to access...

October 1, 2021 No Comments READ MORE +

Which file does the attacker need to modify?

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to"www.MyPersonalBank.com", that the user is directed to a phishing site. Which file does the attacker need to modify?A . Boot.iniB . SudoersC . NetworksD . HostsView AnswerAnswer: D

October 1, 2021 No Comments READ MORE +