Which of the following is not a Bluetooth attack?

Which of the following is not a Bluetooth attack?A . BluedrivingB . BluesmackingC . BluejackingD . BluesnarfingView AnswerAnswer: A Explanation: https://github.com/verovaleros/bluedriving Bluedriving is a bluetooth wardriving utility. It can capture bluetooth devices, lookup their services, get GPS information and present everything in a nice web page. It can search for...

March 20, 2025 No Comments READ MORE +

At what layer of the OSI layer does the encryption and decryption of the message take place?

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the...

March 19, 2025 No Comments READ MORE +

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?A . Man-in-the-middle attackB . Meet-in-the-middle attackC . Replay attackD . Traffic analysis...

March 19, 2025 No Comments READ MORE +

Which tool can be used to perform session splicing attacks?

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?A . tcpspliceB . BurpC . HydraD...

March 18, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

March 18, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

March 18, 2025 No Comments READ MORE +

What type of firewall is inspecting outbound traffic?

During a black-box pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic? A. Circuit B. Stateful C. Application D. Packet FilteringView AnswerAnswer: C Explanation:...

March 16, 2025 No Comments READ MORE +

Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the...

March 16, 2025 No Comments READ MORE +

Which of the following has occurred?

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are...

March 15, 2025 No Comments READ MORE +

What sort of security breach is this policy attempting to mitigate?

A company’s security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?A . Attempts by attackers to access the user and password information stored in the company’s SQL database.B . Attempts by attackers...

March 14, 2025 No Comments READ MORE +