Which of the following attacks could capture network user passwords?

Which of the following attacks could capture network user passwords?A .  Data diddlingB .  SniffingC .  IP SpoofingD .  SmurfingView AnswerAnswer: B Explanation: A network sniffer captures a copy every packet that traverses the network segment the sniffer is connect to. Sniffers are typically devices that can collect information from...

March 22, 2019 No Comments READ MORE +

Individual accountability does not include which of the following?

Individual accountability does not include which of the following?A .  unique identifiersB .  policies & proceduresC .  access rulesD .  audit trailsView AnswerAnswer: B Explanation: Accountability would not include policies & procedures because while important on an effective security program they cannot be used in determing accountability. The following answers...

March 22, 2019 No Comments READ MORE +

Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform a

Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform aA . clear-text attack.B . known cipher attack.C . frequency analysis.D . stochastic assessment.View AnswerAnswer: C

March 22, 2019 No Comments READ MORE +

What are called user interfaces that limit the functions that can be selected by a user?

What are called user interfaces that limit the functions that can be selected by a user?A .  Constrained user interfacesB .  Limited user interfacesC .  Mini user interfacesD .  Unlimited user interfacesView AnswerAnswer: A Explanation: Another method for controlling access is by restricting users to specific functions based on their role...

March 21, 2019 No Comments READ MORE +

What tool do you use to determine whether a host is vulnerable to known attacks?

What tool do you use to determine whether a host is vulnerable to known attacks?A . Padded CellsB . Vulnerability analysisC . Honey PotsD . IDSView AnswerAnswer: B

March 21, 2019 No Comments READ MORE +

Which of the following attacks can this feature help prevent?

A hardware feature is built into a Central Processing Unit (CPU) so that all memory locations used by a process can be marked with a non-executable attribute unless the location explicitly contains executable code. Which of the following attacks can this feature help prevent?A . Brute forceB . Covert channelC...

March 21, 2019 No Comments READ MORE +

Which of the following is an initial consideration when developing an information security management system?

Which of the following is an initial consideration when developing an information security management system?A . Identify the contractual security obligations that apply to the organizationsB . Understand the value of the information assetsC . Identify the level of residual risk that is tolerable to managementD . Identify relevant legislative...

March 21, 2019 No Comments READ MORE +

Which one of the following describes granularity?

Which one of the following describes granularity?A . Maximum number of entries available in an Access Control List (ACL)B . Fineness to which a trusted system can authenticate usersC . Number of violations divided by the number of total accessesD . Fineness to which an access control system can be...

March 21, 2019 No Comments READ MORE +

A reference monitor is specifically designed to

A reference monitor is specifically designed toA . run undetected.B . run autonomously.C . be redundant.D . be tamperproof.View AnswerAnswer: D

March 21, 2019 No Comments READ MORE +

Which of the following statements pertaining to ethical hacking is incorrect?

Which of the following statements pertaining to ethical hacking is incorrect?A . An organization should use ethical hackers who do not sell auditing, consulting, hardware, software, firewall, hosting, and/or networking servicesB . Testing should be done remotelyC . Ethical hacking should not involve writing to or modifying the target systemsD...

March 21, 2019 No Comments READ MORE +