What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
Which type of security feature stops vehicles from crashing through the doors of a building?
Which type of security feature stops vehicles from crashing through the doors of a building?A . Bollards B. Receptionist C. Mantrap D. TurnstileView AnswerAnswer: A
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
The “Gray-box testing” methodology enforces what kind of restriction?
The “Gray-box testing” methodology enforces what kind of restriction?A . Only the external operation of a system is accessible to the tester. B. The internal operation of a system in only partly accessible to the tester. C. Only the internal operation of a system is known to the tester. D....
Which of the following options can be useful to ensure the integrity of the data?
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information...
What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?
env x=’(){ :;};echo exploit’ bash Cc ‘cat/etc/passwd’ What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?A . Removes the passwd file B. Changes all passwords in passwd C. Add new user to the passwd file D. Display passwd content to promptView AnswerAnswer: D
What type of an alert is this?
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?A . False negative B. True negative C. True positive D. False positiveView AnswerAnswer: D Explanation:...
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . Kismet B. Abel C. Netstumbler D. NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...