In the context of Windows Security, what is a 'null' user?
In the context of Windows Security, what is a 'null' user?A . A user that has no skillsB . An account that has been suspended by the adminC . A pseudo account that has no username and passwordD . A pseudo account that was created for security administration purposeView AnswerAnswer:...
CORRECT TEXT
CORRECT TEXT A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network . What isA . this hacking process known as?B . GPS mappingC ....
Which of the following tools must the organization employ to protect its critical infrastructure?
An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT...
What is the name of the process by which you can determine those critical businesses?
On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service. What is the name of the process by which you can determine those critical businesses?A . Emergency Plan Response (EPR)B . Business Impact Analysis (BIA)C...
Which AAA protocol is the most likely able to handle this requirement?
An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol is the most likely able to handle this requirement?A . TACACS+B . DIAMETERC . KerberosD...
Which of these is capable of searching for and locating rogue access points?
Which of these is capable of searching for and locating rogue access points?A . HIDSB . WISSC . WIPSD . NIDSView AnswerAnswer: C
What is Peter Smith talking about?
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers...
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?A . The attacker queries a nameserver using the DNS resolver.B . The attacker makes a request to the DNS resolver.C . The attacker forges a reply from the DNS resolver.D ....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
CORRECT TEXT
CORRECT TEXT A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network . What isA . this hacking process known as?B . GPS mappingC ....