In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?A . Chosen-plaintext attackB . Ciphertext-only attackC . Adaptive chosen-plaintext attackD . Known-plaintext attackView AnswerAnswer: A

September 29, 2020 No Comments READ MORE +

What does the option * indicate?

What does the option * indicate? A . sB . tC . nD . aView AnswerAnswer: C

September 28, 2020 No Comments READ MORE +

Which of the following statements is TRUE?

Which of the following statements is TRUE?A . Sniffers operate on Layer 2 of the OSI modelB . Sniffers operate on Layer 3 of the OSI modelC . Sniffers operate on both Layer 2 & Layer 3 of the OSI model.D . Sniffers operate on the Layer 1 of the...

September 28, 2020 No Comments READ MORE +

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?A . Internet Key Exchange (IKE)B . OakleyC . IPsec Policy AgentD . IPsec driverView AnswerAnswer: A

September 28, 2020 No Comments READ MORE +

Which of the following provides a security professional with most information about the system’s security posture?

Which of the following provides a security professional with most information about the system’s security posture?A . Wardriving, warchalking, social engineeringB . Social engineering, company site browsing, tailgatingC . Phishing, spamming, sending trojansD . Port scanning, banner grabbing, service identificationView AnswerAnswer: D

September 27, 2020 No Comments READ MORE +

What is the most proper answer?

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below: source IP: 192.168.21.100 source port: 80 destination IP: 192.168.10.23 destination port: 63221 What is...

September 27, 2020 No Comments READ MORE +

Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic.

Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. He can mark this alert as:A . False-NegativeB . False-PositiveC . True-PositiveD . False-SignatureView AnswerAnswer: A

September 27, 2020 No Comments READ MORE +

What kind of Web application vulnerability likely exists in their software?

What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities? What kind of Web application vulnerability likely exists in their software?A . Host-Based Intrusion Detection SystemB ....

September 27, 2020 No Comments READ MORE +

Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user’s browser to send malicious requests they did not intend?

Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user’s browser to send malicious requests they did not intend?A . Command Injection AttacksB . File Injection AttackC . Cross-Site Request Forgery (CSRF)D . Hidden Field Manipulation AttackView AnswerAnswer: C

September 27, 2020 No Comments READ MORE +

What should Bob recommend to deal with such a threat?

Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?A . The use of...

September 26, 2020 No Comments READ MORE +