Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?

Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?A . digB . ipconfigC . ifconfigD . nbstatView AnswerAnswer: A

March 9, 2019 No Comments READ MORE +

Which one of the following is the PRIMARY objective of penetration testing?

Which one of the following is the PRIMARY objective of penetration testing?A . AssessmentB . CorrectionC . DetectionD . ProtectionView AnswerAnswer: C

March 9, 2019 No Comments READ MORE +

The act of requiring two of the three factors to be used in the authentication process refers to:

The act of requiring two of the three factors to be used in the authentication process refers to:A .  Two-Factor AuthenticationB .  One-Factor AuthenticationC .  Bi-Factor AuthenticationD .  Double AuthenticationView AnswerAnswer: A Explanation: Two-Factor Authentication refers to the act of requiring two of the three factors to be used in...

March 9, 2019 No Comments READ MORE +

What is called a sequence of characters that is usually longer than the allotted number for a password?

What is called a sequence of characters that is usually longer than the allotted number for a password?A .  passphraseB .  cognitive phraseC .  anticipated phraseD .  Real phraseView AnswerAnswer: A Explanation: A passphrase is a sequence of characters that is usually longer than the allotted number for a password....

March 8, 2019 No Comments READ MORE +

What is Kerberos?

What is Kerberos?A .  A three-headed dog from the egyptian mythology.B .  A trusted third-party authentication protocol.C .  A security model.D .  A remote authentication dial in user server.View AnswerAnswer: B Explanation: Is correct because that is exactly what Kerberos is. The following answers are incorrect: A three-headed dog from Egyptian...

March 8, 2019 No Comments READ MORE +

When building a data classification scheme, which of the following is the PRIMARY concern?

When building a data classification scheme, which of the following is the PRIMARY concern?A . PurposeB . Cost effectivenessC . AvailabilityD . AuthenticityView AnswerAnswer: D

March 8, 2019 No Comments READ MORE +

Kerberos can prevent which one of the following attacks?

Kerberos can prevent which one of the following attacks?A .  Tunneling attack.B .  Playback (replay) attack.C .  Destructive attack.D .  Process attack.View AnswerAnswer: B Explanation: Each ticket in Kerberos has a timestamp and are subject to time expiration to help prevent these types of attacks. The following answers are incorrect:...

March 8, 2019 No Comments READ MORE +

What are the benefits of job rotation?

What are the benefits of job rotation?A . All of the choices.B . Trained backup in case of emergencies.C . Protect against fraud.D . Cross training to employees.View AnswerAnswer: A

March 8, 2019 No Comments READ MORE +