Which statement below is true?

Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]” .

Which statement below is true?
A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.
B . This is a scam because Bob does not know Scott.
C . Bob should write to [email protected] to verify the identity of Scott.
D . This is probably a legitimate message as it comes from a respectable organization.

Answer: A

What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company’s IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks .

What is the countermeasure Mike applied to defend against jamming and scrambling attacks?
A . Allow the usage of functions such as gets and strcpy
B . Allow the transmission of all types of addressed packets at the ISP level
C . Implement cognitive radios in the physical layer
D . A Disable TCP SYN cookie protection

Answer: D

In Trojan terminology, what is a covert channel?

In Trojan terminology, what is a covert channel?

A . A channel that transfers information within a computer system or network in a way that violates the security policy
B . A legitimate communication path within a computer system or network for transfer of data
C . It is a kernel operation that hides boot processes and services to mask detection
D . It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections

Answer: A

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
A . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
B . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
C . Symmetric encryption allows the server to securely transmit the session keys out-of-band.
D . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.

Answer: D

What is the port scanning technique used by Sam to discover open ports?

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?
A . Xmas scan
B . IDLE/IPID header scan
C . TCP Maimon scan
D . ACK flag probe scan

Answer: D

What is the most likely cause?

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.

What is the most likely cause?
A . The network devices are not all synchronized.
B . Proper chain of custody was not observed while collecting the logs.
C . The attacker altered or erased events from the logs.
D . The security breach was a false positive.

Answer: A