What type of message does the client send to the server in order to begin this negotiation?

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?A . ACK B. SYN C. RST D. SYN-ACKView AnswerAnswer: B

October 17, 2022 No Comments READ MORE +

Which of the following is a component of a risk assessment?

Which of the following is a component of a risk assessment?A . Administrative safeguards B. Physical security C. DMZ D. Logical interfaceView AnswerAnswer: A

October 17, 2022 No Comments READ MORE +

What testing method did you use?

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with...

October 17, 2022 No Comments READ MORE +

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the...

October 17, 2022 No Comments READ MORE +

Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accounting

Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accountingA . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting. B. Results matching all words in the query. C. Results for matches on target.com...

October 17, 2022 No Comments READ MORE +

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?A . har.txt B. SAM file C. wwwroot D. Repair fileView AnswerAnswer: B

October 16, 2022 No Comments READ MORE +

Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has...

October 16, 2022 No Comments READ MORE +

What term is commonly used when referring to this type of testing?

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring to this type of testing?A . Randomizing B. Bounding...

October 16, 2022 No Comments READ MORE +

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?A . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead. B. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail. C. Symmetric encryption allows...

October 16, 2022 No Comments READ MORE +

What are some things he can do to prevent it?

A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.A . Use port security on his switches. B. Use a tool like ARPwatch to monitor for strange ARP...

October 16, 2022 No Comments READ MORE +