Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
How can the white hat hacker achieve in the case that he gains control over a user account and attempts to acquire access to another account's confidential files and information in an internal security audit?
Privilege Escalation
Which virus type is triggered by an event, such as the arrival of a specific date and time or the running of a program?
Logic bomb
Which of the following is an important part of physical security?
Preventing interruptions of computer services caused by problems such as fire.
Which of the following has five structural layers: Edge technology, Access gateway, Internet, Middleware, and Application?
IoT architecture
Which of the following is a technique hackers use to obtain information about the services running on a target system if information transmitted by the remote host can be captured to expose the application type, application version, and even operating system type and version?
Banner grabbing
Which of the following technical password attacks are you using if you are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found?
Brute force
You work for a modest start-up firm. The firm is based in a modest office and employs numerous remote workers. You must pick a business solution that can support the company's present size and expand up as it expands. The service must have sufficient storage as well as additional computational power. Which of the following cloud service models should you use?
IaaS
The best practice for users concerned with geotags is which of the following mobile security?
Don't auto-upload photos to social networks.
The best description of telnet is which of the following?
The tool of choice for banner grabbing that operates on port 23.
In symmetric encryption, which of the following is the number of keys used?
One
What should be one of your key recommendations to the bank based on this information?Following a recent data breach, a regional bank engages your firm to undertake a security evaluation on their network. By compromising only one server, the attacker was able to obtain financial data from the bank.
Place a front-end web server in a demilitarized zone that only handles external web traffic
Within an organization's security, which is often considered as the weakest link?
Human
The best description of the scan with ACK evasion method is which of the following?
Helps determine whether the firewall is stateful or stateless and whether or not the ports are open.
Which of the following is the term for the act of using a fictitious situation to persuade someone to perform an activity or provide information that they are not allowed to share?
Pretexting
Comments