If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?
If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?A . CriminalB . InternationalC . CommonD . CivilView AnswerAnswer: D
This kind of password cracking method uses word lists in combination with numbers and special characters:
This kind of password cracking method uses word lists in combination with numbers and special characters:A . HybridB . LinearC . SymmetricD . Brute ForceView AnswerAnswer: A
What kind of attack does the above scenario depict?
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public...
what command-line parameter could you use to determine the type and version number of the web server?
Consider the following Nmap output: what command-line parameter could you use to determine the type and version number of the web server?A . -svB . -PnC . -VD . -ssView AnswerAnswer: A
The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?
Jim’s company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from...
What is Bob supposed to do next?
Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network....
What should you do?
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking. What should you do?A . Confront the client in a respectful manner and ask her about...
which of the following protocols can be used to secure an LDAP service against anonymous queries?
which of the following protocols can be used to secure an LDAP service against anonymous queries?A . SSOB . RADIUSC . WPAD . NTLMView AnswerAnswer: B Explanation: Remote Authentication Dial-In User Service (RADIUS) could be a networking protocols, in operation on ports 1812 and 1813, that gives centralized Authentication, Authorization,...
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?A . All are hacking tools developed by the legion of doomB . All are tools that can be used not only by hackers, but also security personnelC . All are DDOS toolsD . All are tools that are only...
What is the minimum number of network connections in a multi homed firewall?
What is the minimum number of network connections in a multi homed firewall?A . 3B . 5C . 4D . 2View AnswerAnswer: A