A) PIN Number and Birth Date
B) Username and Password
C) Digital Certificate and Hardware Token
D) Fingerprint and Smartcard ID
Correct Answer
verified
Multiple Choice
A) Web fuzzing
B) Web crawling
C) Web spidering
D) Web mirroring
Correct Answer
verified
Multiple Choice
A) By implementing written security procedures, enabling employee security training, and promoting the benefits of security
B) By using informal networks of communication, establishing secret passing procedures, and immediately terminating employees
C) By sharing security secrets with employees, enabling employees to share secrets, and establishing a consultative help line
D) By decreasing an employee's vacation time, addressing ad-hoc employment clauses, and ensuring that managers know employee strengths
Correct Answer
verified
Multiple Choice
A) Process
B) Procedure
C) Policy
D) Paradigm
Correct Answer
verified
Multiple Choice
A) Platform as a service (PaaS)
B) Software as a service (SaaS)
C) Anything as a service (XaaS)
D) Infrastructure as a service (IaaS)
Correct Answer
verified
Multiple Choice
A) MS Excel
B) Notepad
C) Grep
D) Relational Database
Correct Answer
verified
Multiple Choice
A) Threaten to publish the penetration test results if not paid.
B) Follow proper legal procedures against the company to request payment.
C) Tell other customers of the financial problems with payments from this company.
D) Exploit some of the vulnerabilities found on the company webserver to deface it.
Correct Answer
verified
Multiple Choice
A) Packet filtering firewall
B) Application-level firewall
C) Circuit-level gateway firewall
D) Stateful multilayer inspection firewall
Correct Answer
verified
Multiple Choice
A) nmap -p2051 --script ms-sql-info
B) nmap -p1801 --script ms-sql-info
C) nmap -p1443 --script ms-sql-info
D) nmap -p1521 --script ms-sql-info
Correct Answer
verified
Multiple Choice
A) Defense in depth
B) Three-way handshake
C) Covert channels
D) Exponential backoff algorithm
Correct Answer
verified
Multiple Choice
A) Kick-off meeting
B) System patching and hardening
C) Exploiting vulnerabilities
D) Mission briefing
Correct Answer
verified
Multiple Choice
A) Results matching all words in the query
B) Results matching "accounting" in domain target.com but not on the site Marketing.target.com
C) Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting
D) Results for matches on target.com and Marketing.target.com that include the word "accounting"
Correct Answer
verified
Multiple Choice
A) portqry -n myserver -p udp -e 389
B) portqry -n myserver -p udp -e 123
C) portqry -n myserver -p TCP -e 389
D) portqry -n myserver -p TCP -e 123
Correct Answer
verified
Multiple Choice
A) SQL injections
B) Man-in-the-middle
C) Cross-site scripting
D) ARP poisoning
Correct Answer
verified
Multiple Choice
A) SATA
B) PCI
C) XML
D) ISDN
Correct Answer
verified
Multiple Choice
A) Param1=foo&Param2=bar
B) %
C) @variable
D) @@variable
Correct Answer
verified
Multiple Choice
A) Hping
B) Traceroute
C) TCP ping
D) Broadcast ping
Correct Answer
verified
Multiple Choice
A) Microsoft Security Baseline Analyzer
B) Retina
C) Core Impact
D) Microsoft Baseline Security Analyzer
Correct Answer
verified
Multiple Choice
A) John should use SmartWhois to recover the old pages of the website
B) John should recover cashed pages of the website from Google search engine cache
C) John should run the Web Data Extractor tool to recover the old data
D) John can go to Archive.org to see past versions of the company website
Correct Answer
verified
Multiple Choice
A) USB Grabber
B) USB Dumper
C) USB Sniffer
D) USB Snoopy
Correct Answer
verified
Showing 181 - 200 of 317
Related Exams