Which of the following vulnerabilities would occur if this is executed?

Refer to the following code: Which of the following vulnerabilities would occur if this is executed?A . Page exceptionB . Pointer dereferenceC . NullPointerExceptionD . Missing null checkView AnswerAnswer: D

April 29, 2018 No Comments READ MORE +

Which of the following MUST be implemented to support this requirement?

A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable. Which of the following MUST be implemented to support this requirement?A . CSRB...

April 28, 2018 No Comments READ MORE +

Which of the following ports should they block on the firewall?

A technician must configure a firewall to block external DNS traffic from entering a network. Which of the following ports should they block on the firewall?A . 53B . 110C . 143D . 443View AnswerAnswer: A

April 26, 2018 No Comments READ MORE +

Which of the following should be implemented if the administrator does not want to provide the wireless password or certificate to the employees?

A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented if the administrator does not want to provide the wireless password or certificate to the employees?A . WPSB . 802.1xC . WPA2-PSKD...

April 26, 2018 No Comments READ MORE +

Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?

A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle. Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?A...

April 25, 2018 No Comments READ MORE +

Which of the following recommendations should the penetration tester provide to the organization to better protect their web servers in the future?

An organization has hired a penetration tester to test the security of its ten web servers. The penetration tester is able to gain root/administrative access in several servers by exploiting vulnerabilities associated with the implementation of SMTP, POP, DNS, FTP, Telnet, and IMAP. Which of the following recommendations should the...

April 24, 2018 No Comments READ MORE +

Drag and Drop Question

Drag and Drop Question You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan. Instructions: All objects must be used and all place holders must be filled Order does not matter When you have completed the simulation,...

April 22, 2018 No Comments READ MORE +

Which of the following would be the BEST method of updating this application?

An organization relies heavily on an application that has a high frequency of security updates. At present, the security team only updates the application on the first Monday of each month, even though the security updates are released as often as twice a week. Which of the following would be...

April 21, 2018 No Comments READ MORE +

An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the following security exposures would this lead to?

An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the following security exposures would this lead to?A . A virus on the administrator's desktop would be able to sniff the administrator's username and password.B . Result in an attacker being able to...

April 15, 2018 No Comments READ MORE +

Which of the following can be provided to an AAA system for the identification phase?

Which of the following can be provided to an AAA system for the identification phase?A . UsernameB . PermissionsC . One-time tokenD . Private certificateView AnswerAnswer: A

April 11, 2018 No Comments READ MORE +