Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which of the following assessment methods focuses on all types of user risks, including malevolent users, inexperienced users, suppliers, and administrators?
Host-based assessment
The attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users, identify the web application attack.
Cross-Site Scripting (XSS)
Which of the following sub-sections contains the origin of the scan if the results section of an assessment report contains four sub-topics ?
Classification
You are utilizing two-factor authentication by using a smart card and pin.
Something you have and something you know
To masquerade as a legitimate network resource, which of the following is a physical or virtual network device set up?
Honeypot
Above all, which must be protected in order to maintain the security and benefit of an asymmetric cryptographic solution, particularly if it is widely utilized for digital certificates?
Private keys
What type of risk management strategy is Melanie pursuing in the case that she recently completed a risk assessment where she rated the risk of a DDoS attack as a serious threat and she is considering purchasing a DDoS protection service?
Risk mitigation
Which of the following tools would Allen most likely select if he who is the network administrator, needs a tool that can do network intrusion prevention and intrusion detection, capture packets, and monitor information?
Snort
A penetration tester discovers a vulnerable application and is able to steal the URL hyperlink session ID of a website. The session ID can be intercepted by the penetration tester; when the vulnerable application transmits the URL hyperlink to the website, the session IDs are embedded in the hyperlink. The penetration tester employs which of the following types of session hijacking countermeasures?
Session fixation attack
Which of the following host discovery techniques must Andrew use to perform the given task if he is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network?
arp ping scan
Which of the following types of non-technical password attacks has happened in the case Carl received a phone call from a woman who claimed to be from his bank. She informs him that someone has attempted to access his checking account and that she need his account number and password in order to give further details. He gives her his account number and password to her.
Social engineering
Comments