Which of the following attacks could capture network user passwords?
Which of the following attacks could capture network user passwords?A . Data diddlingB . SniffingC . IP SpoofingD . SmurfingView AnswerAnswer: B Explanation: A network sniffer captures a copy every packet that traverses the network segment the sniffer is connect to. Sniffers are typically devices that can collect information from...
Individual accountability does not include which of the following?
Individual accountability does not include which of the following?A . unique identifiersB . policies & proceduresC . access rulesD . audit trailsView AnswerAnswer: B Explanation: Accountability would not include policies & procedures because while important on an effective security program they cannot be used in determing accountability. The following answers...
Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform a
Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform aA . clear-text attack.B . known cipher attack.C . frequency analysis.D . stochastic assessment.View AnswerAnswer: C
What are called user interfaces that limit the functions that can be selected by a user?
What are called user interfaces that limit the functions that can be selected by a user?A . Constrained user interfacesB . Limited user interfacesC . Mini user interfacesD . Unlimited user interfacesView AnswerAnswer: A Explanation: Another method for controlling access is by restricting users to specific functions based on their role...
What tool do you use to determine whether a host is vulnerable to known attacks?
What tool do you use to determine whether a host is vulnerable to known attacks?A . Padded CellsB . Vulnerability analysisC . Honey PotsD . IDSView AnswerAnswer: B
Which of the following attacks can this feature help prevent?
A hardware feature is built into a Central Processing Unit (CPU) so that all memory locations used by a process can be marked with a non-executable attribute unless the location explicitly contains executable code. Which of the following attacks can this feature help prevent?A . Brute forceB . Covert channelC...
Which of the following is an initial consideration when developing an information security management system?
Which of the following is an initial consideration when developing an information security management system?A . Identify the contractual security obligations that apply to the organizationsB . Understand the value of the information assetsC . Identify the level of residual risk that is tolerable to managementD . Identify relevant legislative...
Which one of the following describes granularity?
Which one of the following describes granularity?A . Maximum number of entries available in an Access Control List (ACL)B . Fineness to which a trusted system can authenticate usersC . Number of violations divided by the number of total accessesD . Fineness to which an access control system can be...
A reference monitor is specifically designed to
A reference monitor is specifically designed toA . run undetected.B . run autonomously.C . be redundant.D . be tamperproof.View AnswerAnswer: D
Which of the following statements pertaining to ethical hacking is incorrect?
Which of the following statements pertaining to ethical hacking is incorrect?A . An organization should use ethical hackers who do not sell auditing, consulting, hardware, software, firewall, hosting, and/or networking servicesB . Testing should be done remotelyC . Ethical hacking should not involve writing to or modifying the target systemsD...