PGP, SSL, and IKE are all examples of which type of cryptography?
PGP, SSL, and IKE are all examples of which type of cryptography?A . DigestB . Secret KeyC . Public KeyD . Hash AlgorithmView AnswerAnswer: C
This proves that CompanyXYZ’s email gateway doesn’t prevent what?
CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks...
What type of SQL injection is Elliot most likely performing?
Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He’s determined that the application is vulnerable to SQL injection, and has introduced conditional timing delays into injected queries to determine whether they are successful. What type of SQL injection is Elliot most...
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?A . NmapB . Cain & AbelC . NessusD . SnortView AnswerAnswer: D
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?A . Macro virusB . Stealth/Tunneling virusC . Cavity virusD . Polymorphic virusView AnswerAnswer: B
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virusB . Multipart virusC . Macro virusD . Stealth virusView AnswerAnswer: C
What Web browser-based security vulnerability was exploited to compromise the user?
While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives...
In what kind of system would you find the following string of characters used as a rule within its configuration?
You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTableB . FTP Server ruleC...
What kind of vulnerability must be present to make this remote attack possible?
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged...
Which hacking process is Peter doing?
Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?A . ScanningB . FootprintingC . EnumerationD . System HackingView AnswerAnswer: B