What Web browser-based security vulnerability was exploited to compromise the user?

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Website. When the user click son the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what...

October 6, 2021 No Comments READ MORE +

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?A . MetasploitB . Cain & AbelC . Malte goD . Wire sharkView AnswerAnswer: C

October 6, 2021 No Comments READ MORE +

What is the main theme of the sub-policies for Information Technologies?

Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is...

October 6, 2021 No Comments READ MORE +

What protocol used on Linux serves to synchronize the time has stopped working?

Log monitoring tools performing behavioral analysis have alerted several suspicious login son a Linux server occuring during non-business hours. After further examination of all login activities, it is notices that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realized the...

October 6, 2021 No Comments READ MORE +

Which of the following is not a Bluetooth attack?

Which of the following is not a Bluetooth attack?A . BluesnarfingB . BluedrivingC . BluesmackingD . BluejackingView AnswerAnswer: B

October 5, 2021 No Comments READ MORE +

Which of the following program infects the system boot sector and the executable files at the same time?

Which of the following program infects the system boot sector and the executable files at the same time?A . Stealth virusB . Polymorphic virusC . Macro virusD . Multipartite VirusView AnswerAnswer: D

October 5, 2021 No Comments READ MORE +

What is the main security risk associated with this scenario?

Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it....

October 5, 2021 No Comments READ MORE +

Considering that NMAP result below, which of the following is likely to be installed on the target machine by the OS?

A penetration tester is conducting a ports canon a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering that NMAP result below, which of the following is likely to be installed on the target machine by the OS?A ....

October 5, 2021 No Comments READ MORE +

Which of the following attack scenarios will compromise the privacy of her data?

Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?A . None of these scenarios compromise the privacy of Alice's dataB . Agent Andrew subpoenas Alice, forcing her to reveal...

October 5, 2021 No Comments READ MORE +

Based on this information, what should be one of your key recommendations to the bank?

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the...

October 5, 2021 No Comments READ MORE +