Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?
Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?A . digB . ipconfigC . ifconfigD . nbstatView AnswerAnswer: A
Which one of the following is the PRIMARY objective of penetration testing?
Which one of the following is the PRIMARY objective of penetration testing?A . AssessmentB . CorrectionC . DetectionD . ProtectionView AnswerAnswer: C
The act of requiring two of the three factors to be used in the authentication process refers to:
The act of requiring two of the three factors to be used in the authentication process refers to:A . Two-Factor AuthenticationB . One-Factor AuthenticationC . Bi-Factor AuthenticationD . Double AuthenticationView AnswerAnswer: A Explanation: Two-Factor Authentication refers to the act of requiring two of the three factors to be used in...
What is called a sequence of characters that is usually longer than the allotted number for a password?
What is called a sequence of characters that is usually longer than the allotted number for a password?A . passphraseB . cognitive phraseC . anticipated phraseD . Real phraseView AnswerAnswer: A Explanation: A passphrase is a sequence of characters that is usually longer than the allotted number for a password....
What is Kerberos?
What is Kerberos?A . A three-headed dog from the egyptian mythology.B . A trusted third-party authentication protocol.C . A security model.D . A remote authentication dial in user server.View AnswerAnswer: B Explanation: Is correct because that is exactly what Kerberos is. The following answers are incorrect: A three-headed dog from Egyptian...
When building a data classification scheme, which of the following is the PRIMARY concern?
When building a data classification scheme, which of the following is the PRIMARY concern?A . PurposeB . Cost effectivenessC . AvailabilityD . AuthenticityView AnswerAnswer: D
Kerberos can prevent which one of the following attacks?
Kerberos can prevent which one of the following attacks?A . Tunneling attack.B . Playback (replay) attack.C . Destructive attack.D . Process attack.View AnswerAnswer: B Explanation: Each ticket in Kerberos has a timestamp and are subject to time expiration to help prevent these types of attacks. The following answers are incorrect:...
What are the benefits of job rotation?
What are the benefits of job rotation?A . All of the choices.B . Trained backup in case of emergencies.C . Protect against fraud.D . Cross training to employees.View AnswerAnswer: A