Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 123B . 161C . 69D . 113View AnswerAnswer: A
The developers are now asking you which network should the Presentation Tier (front- end web server) be placed in?
Developers at your company are creating a web application which will be available for use by anyone on the Internet, the developers have taken the approach of implementing a Three-Tier Architecture for the web application. The developers are now asking you which network should the Presentation Tier (front- end web...
Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?A . nmap CA - PnB . nmap CsP Cp-65535-T5C . nmap CsT CO...
Which of the following is the most useful for quick validation?
You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?A . Double quotationB . BackslashC . SemicolonD . Single quotationView AnswerAnswer: D
Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?
Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the...
Which is the first step followed by Vulnerability Scanners for scanning a network?
Which is the first step followed by Vulnerability Scanners for scanning a network?A . TCP/UDP Port scanningB . Firewall detectionC . OS DetectionD . Checking if the remote host is aliveView AnswerAnswer: D
Which one of the following tools the hacker probably used to inject HTML code?
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...
In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?A . Chosen-plaintext attackB . Ciphertext-only attackC . Adaptive chosen-plaintext attackD . Known-plaintext attackView AnswerAnswer: A
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?A . Omnidirectional antennaB . Dipole antennaC . Yagi antennaD . Parabolic grid antennaView AnswerAnswer: C
Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?
Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?A . Chosen-Cipher text AttackB . Ciphertext-only AttackC . Timing AttackD . Rubber Hose AttackView AnswerAnswer: D