Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 123B . 161C . 69D . 113View AnswerAnswer: A

October 17, 2020 No Comments READ MORE +

The developers are now asking you which network should the Presentation Tier (front- end web server) be placed in?

Developers at your company are creating a web application which will be available for use by anyone on the Internet, the developers have taken the approach of implementing a Three-Tier Architecture for the web application. The developers are now asking you which network should the Presentation Tier (front- end web...

October 17, 2020 No Comments READ MORE +

Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?A . nmap CA - PnB . nmap CsP Cp-65535-T5C . nmap CsT CO...

October 16, 2020 No Comments READ MORE +

Which of the following is the most useful for quick validation?

You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?A . Double quotationB . BackslashC . SemicolonD . Single quotationView AnswerAnswer: D

October 16, 2020 No Comments READ MORE +

Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the...

October 16, 2020 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . TCP/UDP Port scanningB . Firewall detectionC . OS DetectionD . Checking if the remote host is aliveView AnswerAnswer: D

October 16, 2020 No Comments READ MORE +

Which one of the following tools the hacker probably used to inject HTML code?

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...

October 16, 2020 No Comments READ MORE +

In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?A . Chosen-plaintext attackB . Ciphertext-only attackC . Adaptive chosen-plaintext attackD . Known-plaintext attackView AnswerAnswer: A

October 16, 2020 No Comments READ MORE +

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?A . Omnidirectional antennaB . Dipole antennaC . Yagi antennaD . Parabolic grid antennaView AnswerAnswer: C

October 16, 2020 No Comments READ MORE +

Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?

Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?A . Chosen-Cipher text AttackB . Ciphertext-only AttackC . Timing AttackD . Rubber Hose AttackView AnswerAnswer: D

October 16, 2020 No Comments READ MORE +