A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desks are cleared. The company is MOST likely trying to protect against.

A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desks are cleared. The company is MOST...

February 12, 2021 No Comments READ MORE +

Which of the following would be the attacker's NEXT action?

An attacker has obtained the user ID and password of a datacenter’s backup operator and has gained access to a production system. Which of the following would be the attacker's NEXT action?A . Perform a passive reconnaissance of the network.B . Initiate a confidential data exfiltration process.C . Look for...

February 12, 2021 No Comments READ MORE +

Fuzzing is used to reveal which of the following vulnerabilities in web applications?

Fuzzing is used to reveal which of the following vulnerabilities in web applications?A . Weak cipher suitesB . Improper input handlingC . DLL injectionD . Certificate signing flawsView AnswerAnswer: B

February 12, 2021 No Comments READ MORE +

Which of the following commands should the penetration tester use to verify if this vulnerability exists?

A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener. Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)A . tcpdumpB . ncC . nmapD . nslookupE . tailF . tracertView...

February 12, 2021 No Comments READ MORE +

Which of the following does the recipient need to decrypt the message?

An email recipient is unable to open a message encrypted through PKI that was sent from another organization. Which of the following does the recipient need to decrypt the message?A . The sender’s private keyB . The recipient’s private keyC . The recipient’s public keyD . The CA’s root certificateE...

February 12, 2021 No Comments READ MORE +

Which of the following BEST describes this cryptographic attack?

A cryptographer has developed a new proprietary hash function for a company and solicited employees to test the function before recommending its implementation. An employee takes the plaintext version of a document and hashes it, then changes the original plaintext document slightly and hashes it, and continues repeating this process...

February 12, 2021 No Comments READ MORE +

Which of the following BEST describes the type of threat the organization faces?

A company moved into a new building next to a sugar mil. Cracks have been discovered in the walls of the server room, which is located on the same side as the sugar mill loading docks. The cracks are believed to have been caused by heavy trucks. Moisture has begun...

February 12, 2021 No Comments READ MORE +

Which of the following attack types does this BEST describe?

A security administrator has received multiple calls from the help desk about customers who are unable to access the organization's web server. Upon reviewing the log files the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources. Which of the following...

February 12, 2021 No Comments READ MORE +

Which of the following would MOST likely be considered a benefit of this certification?

An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?A . It allows for the sharing of digital forensics data across organizations.B . It provides insurance in case of a data breach.C . It provides complimentary training and...

February 12, 2021 No Comments READ MORE +

Which of the following attacks is used to capture the WPA2 handshake?

Which of the following attacks is used to capture the WPA2 handshake?A . ReplayB . IVC . Evil twinD . DisassociationView AnswerAnswer: A

February 11, 2021 No Comments READ MORE +