Which tool can be used to perform session splicing attacks?

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?A . tcpspliceB . BurpC . HydraD...

March 18, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

March 18, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

March 18, 2025 No Comments READ MORE +

What type of firewall is inspecting outbound traffic?

During a black-box pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic? A. Circuit B. Stateful C. Application D. Packet FilteringView AnswerAnswer: C Explanation:...

March 16, 2025 No Comments READ MORE +

Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the...

March 16, 2025 No Comments READ MORE +

Which of the following has occurred?

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are...

March 15, 2025 No Comments READ MORE +

What sort of security breach is this policy attempting to mitigate?

A company’s security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?A . Attempts by attackers to access the user and password information stored in the company’s SQL database.B . Attempts by attackers...

March 14, 2025 No Comments READ MORE +

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?A . nessusB . tcpdumpC . etherealD . jack the ripperView AnswerAnswer: B Explanation: Tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other...

March 13, 2025 No Comments READ MORE +

The collection of potentially actionable, overt, and publicly available information is known as

The collection of potentially actionable, overt, and publicly available information is known asA . Open-source intelligenceB . Real intelligenceC . Social intelligenceD . Human intelligenceView AnswerAnswer: A

March 12, 2025 No Comments READ MORE +

What type of an alert is this?

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?A . False negativeB . True negativeC . True positiveD . False positiveView AnswerAnswer: D Explanation:...

March 9, 2025 No Comments READ MORE +