Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?
Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?A . RootkitB . TrojanC . A WormD . AdwareView AnswerAnswer: C
Which statement below is true?
Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]” . Which statement below is true?A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service...
What is the countermeasure Mike applied to defend against jamming and scrambling attacks?
Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks . What is the countermeasure...
In Trojan terminology, what is a covert channel?
In Trojan terminology, what is a covert channel? A . A channel that transfers information within a computer system or network in a way that violates the security policyB . A legitimate communication path within a computer system or network for transfer of dataC . It is a kernel operation...
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?A . symmetric algorithmsB . asymmetric algorithmsC . hashing algorithmsD . integrity algorithmsView AnswerAnswer: C
This TCP flag instructs the sending system to transmit all buffered data immediately.
This TCP flag instructs the sending system to transmit all buffered data immediately.A . SYNB . RSTC . PSHD . URGE . FINView AnswerAnswer: C
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?A . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.B . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.C ....
What is the port scanning technique used by Sam to discover open ports?
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating...
What kind of attack is this?
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password . What kind of attack is this?A . MAC spoofing attackB . Evil-twin attackC . War driving attackD . Phishing attackView AnswerAnswer: B
What is the most likely cause?
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the...