What are some things he can do to prevent it?

A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.A . Use port security on his switches.B . Use a tool like ARP watch to monitor for strange...

January 16, 2021 No Comments READ MORE +

The “Gray-box testing” methodology enforces what kind of restriction?

The “Gray-box testing” methodology enforces what kind of restriction?A . Only the external operation of a system is accessible to the tester.B . The internal operation of a system in only partly accessible to the tester.C . Only the internal operation of a system is known to the tester.D ....

January 15, 2021 No Comments READ MORE +

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

John the Ripper is a technical assessment tool used to test the weakness of which of the following?A . PasswordsB . File permissionsC . Firewall rulesetsD . UsernamesView AnswerAnswer: A

January 15, 2021 No Comments READ MORE +

What is Eve trying to do?

Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command. What is Eve trying to do?A . Eve...

January 15, 2021 No Comments READ MORE +

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?A . Black-boxB . AnnouncedC . White-boxD . Grey-boxView AnswerAnswer: D

January 15, 2021 No Comments READ MORE +

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....

January 15, 2021 No Comments READ MORE +

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?A . Data items and vulnerability scanningB . Interviewing employees and network...

January 14, 2021 No Comments READ MORE +

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)A . BA810DBA98995F1817306D272A9441BBB . 44EFCE164AB921CQAAD3B435B51404EEC . 0182BD0BD4444BF836077A718CCDF409D . CEC52EB9C8E3455DC2265B23734E0DACE . B757BF5C0D87772FAAD3B435B51404EEF . E52CAC67419A9A224A3B108F3FA6CB6DView AnswerAnswer: B,E

January 14, 2021 No Comments READ MORE +

What do you think is the most likely reason behind this?

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems. However, he is unable to capture any logons though he knows that other users are logging...

January 14, 2021 No Comments READ MORE +

What tool should the analyst use to perform a Blackjacking attack?

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing C Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str......

January 14, 2021 No Comments READ MORE +