What is the best security policy concerning this setup?

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?A . Network elements must...

January 26, 2021No CommentsREAD MORE +

Why is a penetration test considered to be more thorough than vulnerability scan?

Why is a penetration test considered to be more thorough than vulnerability scan?A . Vulnerability scans only do host discovery and port scanning by default.B . A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.C . It is not...

January 26, 2021No CommentsREAD MORE +

What port number is used by LDAP protocol?

What port number is used by LDAP protocol?A . 110B . 389C . 464D . 445View AnswerAnswer: B

January 26, 2021No CommentsREAD MORE +

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?A . SOAB . biometricsC . single sign onD . PKIView AnswerAnswer: D

January 26, 2021No CommentsREAD MORE +

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?A . nessusB . tcpdumpC . etherealD . jack the ripperView AnswerAnswer: B

January 26, 2021No CommentsREAD MORE +

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?A . Forcing the targeted keystream through a hardware-accelerated device such as an ASIC . A backdoor placed into a cryptographic algorithm by its creator.D . Extraction of cryptographic secrets through coercion or torture.E . Attempting to decrypt ciphertext...

January 25, 20211 CommentREAD MORE +

When discussing passwords, what is considered a brute force attack?

When discussing passwords, what is considered a brute force attack?A . You attempt every single possibility until you exhaust all possible combinations or discover the passwordB . You threaten to use the rubber hose on someone unless they reveal their passwordC . You load a dictionary of words into your...

January 25, 2021No CommentsREAD MORE +

Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has...

January 24, 2021No CommentsREAD MORE +

MX record priority increases as the number increases. (True/False.)

MX record priority increases as the number increases. (True/False.)A . TrueB . FalseView AnswerAnswer: B

January 24, 2021No CommentsREAD MORE +

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-A . VCloud basedB . Honypot basedC . Behaviour basedD . Heuristics basedView AnswerAnswer: A

January 24, 2021No CommentsREAD MORE +