What is the role of test automation in security testing?

What is the role of test automation in security testing?A . It is an option but it tends to be very expensive. B. It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies. C. Test automation is not usable in security due...

October 19, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 19, 2022 No Comments READ MORE +

What is the best security policy concerning this setup?

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?A . Network elements must...

October 19, 2022 No Comments READ MORE +

As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?

As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?A . Use the same machines for DNS and other applications B. Harden DNS servers C. Use split-horizon operation for DNS servers D. Restrict Zone transfers E. Have subnet diversity between...

October 18, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 18, 2022 No Comments READ MORE +

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?A . USER, NICK B. LOGIN, NICK C. USER, PASS D. LOGIN, USERView AnswerAnswer: A

October 18, 2022 No Comments READ MORE +

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?A . symmetric algorithms B. asymmetric algorithms C. hashing algorithms D. integrity algorithmsView AnswerAnswer: C

October 18, 2022 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....

October 18, 2022 No Comments READ MORE +

What is the name of the attack which is mentioned in the scenario?

Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is...

October 18, 2022 No Comments READ MORE +

What is correct about digital signatures?

What is correct about digital signatures?A . A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party. B. Digital signatures may be used in different documents of the same type....

October 18, 2022 No Comments READ MORE +