If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?A . Birthday B. Brute force C. Man-in-the-middle D. SmurfView AnswerAnswer: B
Which system consists of a publicly available set of databases that contain domain name registration contact information?
Which system consists of a publicly available set of databases that contain domain name registration contact information?A . WHOIS B. CAPTCHA C. IANA D. IETFView AnswerAnswer: A
is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.
is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.A . DNSSEC B. Resource records C. Resource transfer D. Zone transferView AnswerAnswer: A Explanation: The Domain...
Which of the following is assured by the use of a hash?
Which of the following is assured by the use of a hash?A . Authentication B. Confidentiality C. Availability D. IntegrityView AnswerAnswer: D
What two conditions must a digital signature meet?
What two conditions must a digital signature meet?A . Has to be the same number of characters as a physical signature and must be unique. B. Has to be unforgeable, and has to be authentic. C. Must be unique and have special characters. D. Has to be legible and neat.View...
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
What is the name of the command used by SMTP to transmit email over TLS?
Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?A . nessus B. tcpdump C. ethereal D. jack the ripperView AnswerAnswer: B Explanation: Tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other...