Which of the following attack scenarios will compromise the privacy of her data?

Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?A . None of these scenarios compromise the privacy of Alice’s dataB . Agent Andrew subpoenas Alice, forcing her to reveal...

September 20, 2020 No Comments READ MORE +

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?A . BluesmackingB . BluesniffingC . BluesnarfingD . BluejackingView AnswerAnswer: D

September 20, 2020 No Comments READ MORE +

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B

September 20, 2020 No Comments READ MORE +

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?A . Omnidirectional antennaB . Dipole antennaC . Yagi antennaD . Parabolic grid antennaView AnswerAnswer: C

September 20, 2020 No Comments READ MORE +

The collection of potentially actionable, overt, and publicly available information is known as

The collection of potentially actionable, overt, and publicly available information is known asA . Open-source intelligenceB . Human intelligenceC . Social intelligenceD . Real intelligenceView AnswerAnswer: A

September 20, 2020 No Comments READ MORE +

What is the purpose of a demilitarized zone on a network?

What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...

September 20, 2020 No Comments READ MORE +

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 123B . 161C . 69D . 113View AnswerAnswer: A

September 19, 2020 No Comments READ MORE +

What kind of hackers are we talking about?

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?A . Black-Hat Hackers AB . Script KiddiesC . White-Hat HackersD . Gray-Hat HackerView AnswerAnswer: C

September 19, 2020 2 Comments READ MORE +

What type of breach has the individual just performed?

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?A . Reverse Social EngineeringB . TailgatingC . PiggybackingD . AnnouncedView AnswerAnswer: B

September 19, 2020 No Comments READ MORE +

What type of method is Sam using to evade IDS?

Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide...

September 19, 2020 No Comments READ MORE +