Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

Larry, a security professional in an organization, has noticed some abnormalities In the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a countermeasures to secure the accounts on the web server. Which of the following countermeasures...

March 17, 2021No CommentsREAD MORE +

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop...

March 17, 2021No CommentsREAD MORE +

Which of the following describes the characteristics of a Boot Sector Virus?

Which of the following describes the characteristics of a Boot Sector Virus?A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.B . Moves the MBR to another location on the RAM and copies itself to the original location of the...

March 17, 20211 CommentREAD MORE +

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism?

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism? Code: #include <string.h> int main(){char buffer[8]; strcpy(buffer, ““11111111111111111111111111111””);} Output: Segmentation faultA . C#B . PythonC . JavaD . C++View AnswerAnswer: D

March 17, 2021No CommentsREAD MORE +

What are some things he can do to prevent it?

A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.A . Use port security on his switches.B . Use a tool like ARPwatch to monitor for strange ARP...

March 17, 2021No CommentsREAD MORE +

Which of the following attack techniques is used by John?

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?A...

March 17, 2021No CommentsREAD MORE +

Which of the following attacks did Abel perform in the above scenario?

Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP...

March 17, 2021No CommentsREAD MORE +

Which of the following techniques is described in the above scenario?

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the...

March 17, 2021No CommentsREAD MORE +

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 113B . 69C . 123D . 161View AnswerAnswer: C

March 16, 2021No CommentsREAD MORE +

Which of the following is this type of solution?

Heather’s company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the...

March 16, 2021No CommentsREAD MORE +