What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

September 19, 2023 No Comments READ MORE +

What type of firewall is inspecting outbound traffic?

During a black-box pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic? A. Circuit B. Stateful C. Application D. Packet FilteringView AnswerAnswer: C Explanation:...

September 19, 2023 No Comments READ MORE +

What is the role of test automation in security testing?

What is the role of test automation in security testing?A . It is an option but it tends to be very expensive.B . It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.C . Test automation is not usable in security due...

September 19, 2023 No Comments READ MORE +

Which tool can be used to perform session splicing attacks?

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?A . tcpsplice B. Burp C. Hydra...

October 25, 2022 No Comments READ MORE +

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?A . Behavioral based B. Heuristics based C. Honeypot based D. Cloud basedView AnswerAnswer: D

October 24, 2022 No Comments READ MORE +

Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning tree B. Dynamic ARP Inspection (DAI) C. Port security D. Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...

October 24, 2022 No Comments READ MORE +

How do you prevent DNS spoofing?

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable...

October 24, 2022 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....

October 24, 2022 No Comments READ MORE +

Which method of password cracking takes the most time and effort?

Which method of password cracking takes the most time and effort?A . Dictionary attack B. Shoulder surfing C. Rainbow tables D. Brute forceView AnswerAnswer: D Explanation: Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends...

October 24, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 23, 2022 No Comments READ MORE +