Which of the following program infects the system boot sector and the executable files at the same time?
Which of the following program infects the system boot sector and the executable files at the same time?A . Polymorphic virus B. Stealth virus C. Multipartite Virus D. Macro virusView AnswerAnswer: C
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?A . To determine who is the holder of the root account B. To perform a DoS C. To create needless SPAM D. To illicit...
Which of the following best describes this type of system?
Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?A . A biometric system that bases authentication decisions on behavioral attributes. B. A biometric system that bases authentication decisions on physical attributes. C. An authentication system...
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?A . Nikto B. John the Ripper C. Dsniff D. SnortView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Nikto_(vulnerability_scanner) Nikto is a free software command-line vulnerability scanner that scans web servers for dangerous files/CGIs, outdated server software, and other...
The collection of potentially actionable, overt, and publicly available information is known as
The collection of potentially actionable, overt, and publicly available information is known asA . Open-source intelligence B. Real intelligence C. Social intelligence D. Human intelligenceView AnswerAnswer: A
In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals?
Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as...
Which regulation defines security and privacy controls for Federal information systems and organizations?
Which regulation defines security and privacy controls for Federal information systems and organizations?A . HIPAA B. EU Safe Harbor C. PCI-DSS D. NIST-800-53View AnswerAnswer: D Explanation: NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems except those related to national security....
What is the recommended architecture in terms of server placement?
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?A . All three servers need to be placed internally B. A web server facing...
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....