What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?A . Residual riskB . Impact riskC . Deferred riskD . Inherent riskView AnswerAnswer: A

June 7, 2021No CommentsREAD MORE +

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

An attacker runs netcat tool to transfer a secret file between two hosts. He is worried about information being sniffed on the network. How would the attacker use netcat to encrypt the information before transmitting onto the wire?A . Machine A: netcat -l -p -s password 1234 < testfileMachine B:...

June 7, 2021No CommentsREAD MORE +

What attack has likely occurred?

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?A . Wireless sniffingB . PiggybackingC . Evil twinD . WardrivingView AnswerAnswer: C Explanation:...

June 7, 2021No CommentsREAD MORE +

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.A . DNSSECB . Resource recordsC . Resource transferD . Zone transferView AnswerAnswer: A

June 6, 2021No CommentsREAD MORE +

What is the minimum number of network connections in a multihomed firewall?

What is the minimum number of network connections in a multihomed firewall?A . 3B . 5C . 4D . 2View AnswerAnswer: A

June 6, 2021No CommentsREAD MORE +

This proves that CompanyXYZ’s email gateway doesn’t prevent what?

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks...

June 6, 2021No CommentsREAD MORE +

What is the attack performed on Don in the above scenario?

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on...

June 6, 2021No CommentsREAD MORE +

If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?

If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?A . CrB . CFC . CPD . CsPView AnswerAnswer: B

June 6, 2021No CommentsREAD MORE +

What is this type of rootkit an example of?

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected. In the core components of the operating system. What is this type of rootkit an example of?A . Mypervisor rootkitB . Kernel toolkitC . Hardware rootkitD . Firmware rootkitView AnswerAnswer: B Explanation: Kernel-mode rootkits run...

June 6, 2021No CommentsREAD MORE +

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?A . BirthdayB . Brute forceC . Man-in-the-middleD . SmurfView AnswerAnswer: B

June 6, 2021No CommentsREAD MORE +