Why should the security analyst disable/remove unnecessary ISAPI filters?

Why should the security analyst disable/remove unnecessary ISAPI filters?A . To defend against social engineering attacksB . To defend against webserver attacksC . To defend against jailbreakingD . To defend against wireless attacksView AnswerAnswer: B

March 26, 2021No CommentsREAD MORE +

which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?A . intrusion detection systemB . HoneypotC . Botnet D FirewallView AnswerAnswer: B Explanation: A honeypot may be a trap that an IT...

March 26, 2021No CommentsREAD MORE +

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?A . 110B . 135C . 139D . 161E . 445F . 1024View AnswerAnswer: B,C,E

March 26, 2021No CommentsREAD MORE +

This Is likely a failure in which of the following security processes?

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior 10 the Intrusion. This Is likely a failure in which of the following...

March 26, 2021No CommentsREAD MORE +

What is the first step that the bank should take before enabling the audit feature?

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?A . Perform a vulnerability scan of the system.B . Determine the impact of enabling...

March 25, 2021No CommentsREAD MORE +

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?A . tcptraceB . NessusC . OpenVASD . tcptracerouteView AnswerAnswer: A

March 25, 2021No CommentsREAD MORE +

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?A . Hash valueB . Private keyC . Digital signatureD . Digital certificateView AnswerAnswer: D

March 25, 2021No CommentsREAD MORE +

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?A . NiktoB . John the RipperC . DsniffD . SnortView AnswerAnswer: A

March 25, 2021No CommentsREAD MORE +

What is the attack performed by Boney in the above scenario?

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session 10 to the target employee. The session ID...

March 25, 2021No CommentsREAD MORE +

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Password cracking programs reverse the hashing process to recover passwords. (True/False.)A . TrueB . FalseView AnswerAnswer: B

March 25, 2021No CommentsREAD MORE +