Which of the following vulnerabilities would occur if this is executed?
Refer to the following code: Which of the following vulnerabilities would occur if this is executed?A . Page exceptionB . Pointer dereferenceC . NullPointerExceptionD . Missing null checkView AnswerAnswer: D
Which of the following MUST be implemented to support this requirement?
A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable. Which of the following MUST be implemented to support this requirement?A . CSRB...
Which of the following ports should they block on the firewall?
A technician must configure a firewall to block external DNS traffic from entering a network. Which of the following ports should they block on the firewall?A . 53B . 110C . 143D . 443View AnswerAnswer: A
Which of the following should be implemented if the administrator does not want to provide the wireless password or certificate to the employees?
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented if the administrator does not want to provide the wireless password or certificate to the employees?A . WPSB . 802.1xC . WPA2-PSKD...
Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?
A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle. Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?A...
Which of the following recommendations should the penetration tester provide to the organization to better protect their web servers in the future?
An organization has hired a penetration tester to test the security of its ten web servers. The penetration tester is able to gain root/administrative access in several servers by exploiting vulnerabilities associated with the implementation of SMTP, POP, DNS, FTP, Telnet, and IMAP. Which of the following recommendations should the...
Drag and Drop Question
Drag and Drop Question You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan. Instructions: All objects must be used and all place holders must be filled Order does not matter When you have completed the simulation,...
Which of the following would be the BEST method of updating this application?
An organization relies heavily on an application that has a high frequency of security updates. At present, the security team only updates the application on the first Monday of each month, even though the security updates are released as often as twice a week. Which of the following would be...
An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the following security exposures would this lead to?
An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the following security exposures would this lead to?A . A virus on the administrator's desktop would be able to sniff the administrator's username and password.B . Result in an attacker being able to...
Which of the following can be provided to an AAA system for the identification phase?
Which of the following can be provided to an AAA system for the identification phase?A . UsernameB . PermissionsC . One-time tokenD . Private certificateView AnswerAnswer: A