PGP, SSL, and IKE are all examples of which type of cryptography?

PGP, SSL, and IKE are all examples of which type of cryptography?A . DigestB . Secret KeyC . Public KeyD . Hash AlgorithmView AnswerAnswer: C

January 21, 20211 CommentREAD MORE +

This proves that CompanyXYZ’s email gateway doesn’t prevent what?

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks...

January 21, 2021No CommentsREAD MORE +

What type of SQL injection is Elliot most likely performing?

Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He’s determined that the application is vulnerable to SQL injection, and has introduced conditional timing delays into injected queries to determine whether they are successful. What type of SQL injection is Elliot most...

January 20, 2021No CommentsREAD MORE +

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?A . NmapB . Cain & AbelC . NessusD . SnortView AnswerAnswer: D

January 20, 2021No CommentsREAD MORE +

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?A . Macro virusB . Stealth/Tunneling virusC . Cavity virusD . Polymorphic virusView AnswerAnswer: B

January 19, 2021No CommentsREAD MORE +

Which of the following programs is usually targeted at Microsoft Office products?

Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virusB . Multipart virusC . Macro virusD . Stealth virusView AnswerAnswer: C

January 19, 2021No CommentsREAD MORE +

What Web browser-based security vulnerability was exploited to compromise the user?

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives...

January 19, 2021No CommentsREAD MORE +

In what kind of system would you find the following string of characters used as a rule within its configuration?

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTableB . FTP Server ruleC...

January 19, 2021No CommentsREAD MORE +

What kind of vulnerability must be present to make this remote attack possible?

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged...

January 19, 2021No CommentsREAD MORE +

Which hacking process is Peter doing?

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?A . ScanningB . FootprintingC . EnumerationD . System HackingView AnswerAnswer: B

January 19, 2021No CommentsREAD MORE +