Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?A . Disk encryptionB . BIOS passwordC . Hidden foldersD . Password protected filesView AnswerAnswer: A

September 22, 2018 No Comments READ MORE +

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Which protocol is used for setting up secure channels between two devices, typically in VPNs?A . PPPB . IPSECC . PEMD . SETView AnswerAnswer: B

September 21, 2018 No Comments READ MORE +

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.A . SQL injection attackB . Cross-Site Scripting (XSS)C . LDAP Injection attackD . Cross-Site Request Forgery (CSRF)View AnswerAnswer: B

September 20, 2018 No Comments READ MORE +

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?A . Bootrom ExploitB . iBoot ExploitC . Sandbox ExploitD . Userland ExploitView AnswerAnswer: D

September 18, 2018 No Comments READ MORE +

From the following table, identify the wrong answer in terms of Range (ft).

From the following table, identify the wrong answer in terms of Range (ft). A . 802.11bB . 802.11gC . 802.16(WiMax)D . 802.11aView AnswerAnswer: D

September 16, 2018 No Comments READ MORE +

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?A . SnortB . NmapC . Cain & AbelD . NessusView AnswerAnswer: A

September 10, 2018 No Comments READ MORE +

Which of the following is the best countermeasure to encrypting ransomwares?

Which of the following is the best countermeasure to encrypting ransomwares?A . Use multiple antivirus softwaresB . Keep some generation of off-line backupC . Analyze the ransomware to get decryption key of encrypted dataD . Pay a ransomView AnswerAnswer: B

September 7, 2018 No Comments READ MORE +

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B

September 3, 2018 No Comments READ MORE +

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?A . MetasploitB . Cain & AbelC . MaltegoD . WiresharkView AnswerAnswer: C

September 2, 2018 No Comments READ MORE +