What is correct about digital signatures?
What is correct about digital signatures?A . A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing partyB . Digital signatures maybe used in different documents of the same type.C ....
Which Linux-based tool can change any user's password or activate disabled Windows accounts?
You have gained physical access to a Windows 2008R 2 server which has an accessible disc drive. When you attempt to boot the server and login, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux Live CD. Which Linux-based tool can change any...
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a______ database structure instead of SQL's________ structure.
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a______ database structure instead of SQL's________ structure. Because of this, LDAP has difficulty representing many-to-one relationships.A . Strict, AbstractB . Simple, ComplexC . Relational, HierarchicalD . Hierarchical, RelationalView AnswerAnswer: D
Which three flags are set?
An attacker scans a host with the below command. Which three flags are set? (Choose three.) #nmap-sXhost.domain.comA . This is ACK scan. ACK flag is setB . This is Xmas scan. SYN and ACK flags are setC . This is Xmas scan. URG, PUSH and FIN are setD . This...
What is the proper syntax?
You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?A . hping2-1 host.domain.comB . hping2-i host.domain.comC . hping2-set-lCMP host.domain.comD . hping2 host.domain.comView AnswerAnswer: A
Which of the following regulations best matches the description?
It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep...
Which of the following firewall rules meets this requirement?
To reach a bank website, the traffic from workstations must passthrough a firewall You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/ 24 can only reach the bank website 10.20.20.1 using https. Which of the following firewall rules meets this requirement?A . If...
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated webpages to inject client-side script into webpages viewed by other users.
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated webpages to inject client-side script into webpages viewed by other users.A . SQL injection attackB . Cross-Site Scripting (XSS)C . LDAP Injection attackD . Cross-Site Request Forgery (CSRF)View AnswerAnswer: B
Which of the following solution will you suggest?
You are monitoring the network of your organizations. You notice that: - There are huge outbound connections from your Internal Network to External IPs. - On further investigation, you see that the External IPs are blacklisted. - Some connections are accepted, and some are dropped. - You find that it...
Which program would you use?
You want to analyze packets on your wireless network. Which program would you use?A . Wireshark with AirpcapB . Airsnort with AirpcapC . Wireshark with WinpcapD . Ethereal with WinpcapView AnswerAnswer: A