What is the recommended architecture in terms of server placement?
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?A . All three servers need to be placed internally B. A web server facing...
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
What type of message does the client send to the server in order to begin this negotiation?
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?A . ACK B. SYN C. RST D. SYN-ACKView AnswerAnswer: B
Which of the following is a component of a risk assessment?
Which of the following is a component of a risk assessment?A . Administrative safeguards B. Physical security C. DMZ D. Logical interfaceView AnswerAnswer: A
What testing method did you use?
You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with...
A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?
A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the...
Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accounting
Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accountingA . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting. B. Results matching all words in the query. C. Results for matches on target.com...
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?A . har.txt B. SAM file C. wwwroot D. Repair fileView AnswerAnswer: B
Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?
Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has...