Which of the following vulnerabilities is present?

An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code: Which of the following vulnerabilities is present?A . Bad memory pointerB . Buffer overflowC . Integer overflowD . BackdoorView AnswerAnswer: B

May 17, 2021 No Comments READ MORE +

Which of the following policies or procedures could have prevented this from occurring?

A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from...

May 17, 2021 No Comments READ MORE +

Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?

Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?A . Roll back changes in the test environmentB . Verify the hashes of filesC . Archive and compress the filesD . Update the secure baselineView AnswerAnswer: B

May 17, 2021 No Comments READ MORE +

Which of the following account types is the systems administrator using?

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?A . Shared accountB . Guest accountC . Service accountD ....

May 17, 2021 No Comments READ MORE +

An employer requires that employees use a key-generating app on their smartphones to log into corporate applications.

An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:A . Something you have.B . Something you know.C . Something you do.D . Something you are.View AnswerAnswer:...

May 17, 2021 No Comments READ MORE +

Which of the following methods did the auditor MOST likely use?

An auditor is reviewing the following output from a password-cracking tool: Which of the following methods did the auditor MOST likely use?A . HybridB . DictionaryC . Brute forceD . Rainbow tableView AnswerAnswer: A

May 16, 2021 No Comments READ MORE +

Which of the following technologies allows for encrypted authentication of wireless clients over TLS?

An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?A . PEAPB . EAPC . WPA2D . RADIUSView AnswerAnswer: A Explanation: EAP by itself is only an authentication framework. PEAP (Protected Extensible...

May 16, 2021 No Comments READ MORE +

Which of the following commands should be used?

An auditor wants to test the security posture of an organization by running a tool that will display the following: Which of the following commands should be used?A . nbtstatB . ncC . arpD . ipconfigView AnswerAnswer: A

May 16, 2021 No Comments READ MORE +

In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?

In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?A . Using saltB . Using hash algorithmsC . Implementing elliptical curveD . Implementing PKIView AnswerAnswer: A

May 15, 2021 No Comments READ MORE +

When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?

When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?A . DESB . AESC . MD5D . WEPView AnswerAnswer: B

May 15, 2021 No Comments READ MORE +