Which of the following has occurred?

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are...

October 21, 2022 No Comments READ MORE +

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?A . Residual risk B. Impact risk C. Deferred risk D. Inherent riskView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Residual_risk The residual risk is the risk or danger of an action or an event,...

October 21, 2022 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....

October 21, 2022 No Comments READ MORE +

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....

October 20, 2022 No Comments READ MORE +

Which hacking process is Peter doing?

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?A . Scanning B. Footprinting C. Enumeration D. System HackingView AnswerAnswer: B

October 20, 2022 No Comments READ MORE +

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor".

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs: From the above list identify the user account with System Administrator privileges.A . John B. Rebecca C. Sheela D. Shawn E. Somia F. Chang G. MicahView AnswerAnswer: F

October 20, 2022 No Comments READ MORE +

What is the proper response for a NULL scan if the port is open?

What is the proper response for a NULL scan if the port is open?A . SYN B. ACK C. FIN D. PSH E. RST F. No responseView AnswerAnswer: F

October 20, 2022 No Comments READ MORE +

statement below is true?

Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]”. Which statement below is true?A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees....

October 20, 2022 No Comments READ MORE +

What is the best approach for discovering vulnerabilities on a Windows-based computer?

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?A . Use the built-in Windows Update tool B. Use a scan tool like Nessus C. Check MITRE.org for the latest list...

October 20, 2022 No Comments READ MORE +

Which of the following is not a Bluetooth attack?

Which of the following is not a Bluetooth attack?A . Bluedriving B. Bluesmacking C. Bluejacking D. BluesnarfingView AnswerAnswer: A Explanation: https://github.com/verovaleros/bluedriving Bluedriving is a bluetooth wardriving utility. It can capture bluetooth devices, lookup their services, get GPS information and present everything in a nice web page. It can search for...

October 20, 2022 No Comments READ MORE +