Loading questions...
Updated
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
Which of the following describes the characteristics of a Boot Sector Virus?
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
Which of the following programs is usually targeted at Microsoft Office products?
Bluetooth uses which digital modulation technique to exchange information between paired devices?
In order to show improvement of security over time, what must be developed?
Passive reconnaissance involves collecting information through which of the following?
Which of the following is a component of a risk assessment?
When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?
A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?
Which of the following techniques will identify if computer files have been changed?
Which system consists of a publicly available set of databases that contain domain name registration contact information?
A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?
An NMAP scan of a server shows port 69 is open. What risk could this pose?
What information should an IT system analysis provide to the risk assessor?
How can rainbow tables be defeated?
Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
Which of the following is considered an acceptable option when managing a risk?
Which security control role does encryption meet?
A covert channel is a channel that
John the Ripper is a technical assessment tool used to test the weakness of which of the following?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Which of the following is an application that requires a host application for replication?