Which of the following is assured by the use of a hash?

Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D

September 25, 2023 No Comments READ MORE +

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?A . har.txtB . SAM fileC . wwwrootD . Repair fileView AnswerAnswer: B

September 25, 2023 No Comments READ MORE +

What is the best approach for discovering vulnerabilities on a Windows-based computer?

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?A . Use the built-in Windows Update toolB . Use a scan tool like NessusC . Check MITRE.org for the latest list...

September 25, 2023 No Comments READ MORE +

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . ESP transport modeB . ESP confidentialC . AH permiscuousD . AH Tunnel modeView AnswerAnswer: A

September 25, 2023 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

September 25, 2023 No Comments READ MORE +

What is a possible source of this problem?

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not...

September 25, 2023 No Comments READ MORE +

Which hacking process is Peter doing?

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?A . ScanningB . FootprintingC . EnumerationD . System HackingView AnswerAnswer: B

September 25, 2023 No Comments READ MORE +

Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has...

September 25, 2023 No Comments READ MORE +

What type of message does the client send to the server in order to begin this negotiation?

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?A . ACKB . SYNC . RSTD . SYN-ACKView AnswerAnswer: B

September 24, 2023 No Comments READ MORE +

Which file does the attacker need to modify?

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?A . Boot.iniB . SudoersC . NetworksD . HostsView AnswerAnswer: D

September 24, 2023 No Comments READ MORE +