Which of the following vulnerabilities is present?
An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code: Which of the following vulnerabilities is present?A . Bad memory pointerB . Buffer overflowC . Integer overflowD . BackdoorView AnswerAnswer: B
Which of the following policies or procedures could have prevented this from occurring?
A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from...
Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?
Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?A . Roll back changes in the test environmentB . Verify the hashes of filesC . Archive and compress the filesD . Update the secure baselineView AnswerAnswer: B
Which of the following account types is the systems administrator using?
A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?A . Shared accountB . Guest accountC . Service accountD ....
An employer requires that employees use a key-generating app on their smartphones to log into corporate applications.
An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:A . Something you have.B . Something you know.C . Something you do.D . Something you are.View AnswerAnswer:...
Which of the following methods did the auditor MOST likely use?
An auditor is reviewing the following output from a password-cracking tool: Which of the following methods did the auditor MOST likely use?A . HybridB . DictionaryC . Brute forceD . Rainbow tableView AnswerAnswer: A
Which of the following technologies allows for encrypted authentication of wireless clients over TLS?
An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?A . PEAPB . EAPC . WPA2D . RADIUSView AnswerAnswer: A Explanation: EAP by itself is only an authentication framework. PEAP (Protected Extensible...
Which of the following commands should be used?
An auditor wants to test the security posture of an organization by running a tool that will display the following: Which of the following commands should be used?A . nbtstatB . ncC . arpD . ipconfigView AnswerAnswer: A
In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?A . Using saltB . Using hash algorithmsC . Implementing elliptical curveD . Implementing PKIView AnswerAnswer: A
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?A . DESB . AESC . MD5D . WEPView AnswerAnswer: B