Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?A . Preparation phase B. Containment phase C. Identification phase D. Recovery phaseView AnswerAnswer: A
What is the closest approximate cost of this replacement and recovery operation per year?
The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...
Which of the following has occurred?
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are...
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?A . Residual risk B. Impact risk C. Deferred risk D. Inherent riskView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Residual_risk The residual risk is the risk or danger of an action or an event,...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....
Which hacking process is Peter doing?
Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?A . Scanning B. Footprinting C. Enumeration D. System HackingView AnswerAnswer: B
Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor".
Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs: From the above list identify the user account with System Administrator privileges.A . John B. Rebecca C. Sheela D. Shawn E. Somia F. Chang G. MicahView AnswerAnswer: F
What is the proper response for a NULL scan if the port is open?
What is the proper response for a NULL scan if the port is open?A . SYN B. ACK C. FIN D. PSH E. RST F. No responseView AnswerAnswer: F