Which of the following attack scenarios will compromise the privacy of her data?
Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?A . None of these scenarios compromise the privacy of Alice’s dataB . Agent Andrew subpoenas Alice, forcing her to reveal...
Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?
Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?A . BluesmackingB . BluesniffingC . BluesnarfingD . BluejackingView AnswerAnswer: D
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?A . Omnidirectional antennaB . Dipole antennaC . Yagi antennaD . Parabolic grid antennaView AnswerAnswer: C
The collection of potentially actionable, overt, and publicly available information is known as
The collection of potentially actionable, overt, and publicly available information is known asA . Open-source intelligenceB . Human intelligenceC . Social intelligenceD . Real intelligenceView AnswerAnswer: A
What is the purpose of a demilitarized zone on a network?
What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 123B . 161C . 69D . 113View AnswerAnswer: A
What kind of hackers are we talking about?
These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?A . Black-Hat Hackers AB . Script KiddiesC . White-Hat HackersD . Gray-Hat HackerView AnswerAnswer: C
What type of breach has the individual just performed?
An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?A . Reverse Social EngineeringB . TailgatingC . PiggybackingD . AnnouncedView AnswerAnswer: B
What type of method is Sam using to evade IDS?
Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide...