During an Xmas scan what indicates a port is closed?

During an Xmas scan what indicates a port is closed?A . No return responseB . RSTC . ACKD . SYNView AnswerAnswer: B

September 25, 2021No CommentsREAD MORE +

- Lower entry cost Which type of IDS is best suited for Tremp's requirements?

Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics: - Verifies success or failure of an attack - Monitors system activities Detects attacks that a network-based IDS fails to detect -...

September 25, 2021No CommentsREAD MORE +

What type of an alert is this?

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration . What type of an alert is this?A . False negativeB . True negativeC . True positiveD . False positiveView AnswerAnswer: D

September 24, 2021No CommentsREAD MORE +

What is the enumeration technique used by Henry on the organization?

Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization's user . What is the enumeration technique...

September 24, 2021No CommentsREAD MORE +

What is the service enumerated byjames in the above scenario?

Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration on an organization's network. In the process of enumeration, James discovered a service that is accessible to external sources. This service runs directly on port 21 . What is the service enumerated byjames in...

September 24, 2021No CommentsREAD MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS DetectionB . Firewall detectionC . TCP/UDP Port scanningD . Checking if the remote host is aliveView AnswerAnswer: D

September 24, 2021No CommentsREAD MORE +

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.A . Bryan’s public key; Bryan’s public keyB . Alice’s...

September 23, 2021No CommentsREAD MORE +

What is a NULL scan?

What is a NULL scan?A . A scan in which all flags are turned offB . A scan in which certain flags are offC . A scan in which all flags are onD . A scan in which the packet size is set to zeroE . A scan with an...

September 23, 2021No CommentsREAD MORE +

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism?

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism? Code: #include <string.h> int main(){char buffer[8]; strcpy(buffer, ““11111111111111111111111111111””);} Output: Segmentation faultA . C#B . PythonC . JavaD . C++View AnswerAnswer: D

September 23, 2021No CommentsREAD MORE +

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?A . Residual riskB . Impact riskC . Deferred riskD . Inherent riskView AnswerAnswer: A

September 23, 2021No CommentsREAD MORE +