Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?
Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?A . Disk encryptionB . BIOS passwordC . Hidden foldersD . Password protected filesView AnswerAnswer: A
Which protocol is used for setting up secure channels between two devices, typically in VPNs?
Which protocol is used for setting up secure channels between two devices, typically in VPNs?A . PPPB . IPSECC . PEMD . SETView AnswerAnswer: B
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.A . SQL injection attackB . Cross-Site Scripting (XSS)C . LDAP Injection attackD . Cross-Site Request Forgery (CSRF)View AnswerAnswer: B
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?A . Bootrom ExploitB . iBoot ExploitC . Sandbox ExploitD . Userland ExploitView AnswerAnswer: D
From the following table, identify the wrong answer in terms of Range (ft).
From the following table, identify the wrong answer in terms of Range (ft). A . 802.11bB . 802.11gC . 802.16(WiMax)D . 802.11aView AnswerAnswer: D
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?A . SnortB . NmapC . Cain & AbelD . NessusView AnswerAnswer: A
Which of the following is the best countermeasure to encrypting ransomwares?
Which of the following is the best countermeasure to encrypting ransomwares?A . Use multiple antivirus softwaresB . Keep some generation of off-line backupC . Analyze the ransomware to get decryption key of encrypted dataD . Pay a ransomView AnswerAnswer: B
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B
The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router, nobody can access to the ftp, and the permitted hosts cannot access the Internet. According to the next configuration, what is happening in the network?
The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router, nobody...
Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?
Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?A . MetasploitB . Cain & AbelC . MaltegoD . WiresharkView AnswerAnswer: C