Which of the following program infects the system boot sector and the executable files at the same time?
Which of the following program infects the system boot sector and the executable files at the same time?A . Polymorphic virusB . Stealth virusC . Multipartite VirusD . Macro virusView AnswerAnswer: C
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
Under what conditions does a secondary name server request a zone transfer from a primary name server?
Under what conditions does a secondary name server request a zone transfer from a primary name server?A . When a primary SOA is higher that a secondary SOAB . When a secondary SOA is higher that a primary SOAC . When a primary name server has had its service restartedD...
What is the purpose of a demilitarized zone on a network?
What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...
Which is the first step followed by Vulnerability Scanners for scanning a network?
Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS DetectionB . Firewall detectionC . TCP/UDP Port scanningD . Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:
What will he do next?
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.B . He will activate OSPF on the spoofed root...
Which of the following describes the characteristics of a Boot Sector Virus?
Which of the following describes the characteristics of a Boot Sector Virus?A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.B . Moves the MBR to another location on the RAM and copies itself to the original location of the...
What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?
env x=’(){ :;};echo exploit’ bash Cc ‘cat/etc/passwd’ What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?A . Removes the passwd fileB . Changes all passwords in passwdC . Add new user to the passwd fileD . Display passwd content to promptView AnswerAnswer: D
Which one of the following tools the hacker probably used to inject HTML code?
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...