What is the role of test automation in security testing?

What is the role of test automation in security testing?A . It is an option but it tends to be very expensive.B . It should be used exclusively. Manual testing is outdated because of low spend and possible test setup inconsistencies.C . Test automation is not usable in security due...

September 28, 2021 No Comments READ MORE +

Which of the following has occurred?

A technician is re soling an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they...

September 28, 2021 No Comments READ MORE +

Which of the following is considered as one of the most reliable forms of TCP scanning?

Which of the following is considered as one of the most reliable forms of TCP scanning?A . TCP Connect/Full Open ScanB . Half-open ScanC . NULL ScanD . Xmas ScanView AnswerAnswer: A

September 28, 2021 No Comments READ MORE +

What is the minimum number of network connections in a multihomed firewall?

What is the minimum number of network connections in a multihomed firewall?A . 3B . 2C . 5D . 4View AnswerAnswer: B

September 28, 2021 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the pubic network and the payment card data.B . Use encryption to protect all transmission of cardholder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D . Limit...

September 27, 2021 No Comments READ MORE +

Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner's permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...

September 27, 2021 No Comments READ MORE +

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . IPsecB . SFTPC . FTPSD . SSLView AnswerAnswer: A

September 27, 2021 No Comments READ MORE +

What do you want to “know" to prove yourself that it was Bob who had send a mail?

Bob, your senior colleague, has sent you a mail regarding a a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to “know" to prove yourself that...

September 27, 2021 No Comments READ MORE +

The "Gray-box testing" methodology enforces what kind of restriction?

The "Gray-box testing" methodology enforces what kind of restriction?A . Only the internal operation of a system is known to the tester.B . The internal operation of a system is completely known to the tester.C . The internal operation of a system is only partly accessible to the testerD ....

September 27, 2021 No Comments READ MORE +

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?A . ScalabilityB . SpeedC . Key distributionD . SecurityView AnswerAnswer: B

September 27, 2021 No Comments READ MORE +