What is correct about digital signatures?

What is correct about digital signatures?A . A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.B . Digital signatures may be used in different documents of the same type.C...

April 5, 2025 No Comments READ MORE +

Which other option could the tester use to get a response from a host using TCP?

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using...

April 4, 2025 No Comments READ MORE +

What is the recommended architecture in terms of server placement?

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?A . All three servers need to be placed internallyB . A web server facing...

April 4, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

April 4, 2025 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS DetectionB . Firewall detectionC . TCP/UDP Port scanningD . Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:

April 4, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

April 2, 2025 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

April 2, 2025 No Comments READ MORE +

Which of the following is a component of a risk assessment?

Which of the following is a component of a risk assessment?A . Administrative safeguardsB . Physical securityC . DMZD . Logical interfaceView AnswerAnswer: A

April 1, 2025 No Comments READ MORE +

It affected many Internet-facing services, which OS did it not directly affect?

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?A . LinuxB . UnixC . OS XD . WindowsView AnswerAnswer: D

April 1, 2025 No Comments READ MORE +

What Nmap script will help you with this task?

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file...

March 29, 2025 No Comments READ MORE +