Which of the following is assured by the use of a hash?

Which of the following is assured by the use of a hash?A . Authentication B. Confidentiality C. Availability D. IntegrityView AnswerAnswer: D

October 12, 2022 No Comments READ MORE +

What two conditions must a digital signature meet?

What two conditions must a digital signature meet?A . Has to be the same number of characters as a physical signature and must be unique. B. Has to be unforgeable, and has to be authentic. C. Must be unique and have special characters. D. Has to be legible and neat.View...

October 12, 2022 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 12, 2022 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....

October 11, 2022 No Comments READ MORE +

What is the name of the command used by SMTP to transmit email over TLS?

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is...

October 11, 2022 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data. B. Use encryption to protect all transmission of card holder data over any public network. C. Rotate employees handling credit card transactions on a yearly basis to different departments. D....

October 11, 2022 No Comments READ MORE +

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?A . nessus B. tcpdump C. ethereal D. jack the ripperView AnswerAnswer: B Explanation: Tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other...

October 11, 2022 No Comments READ MORE +

Which of the following tools can be used to perform a zone transfer?

Which of the following tools can be used to perform a zone transfer?A . NSLookup B. Finger C. Dig D. Sam Spade E. Host F. Netcat G. NeotraceView AnswerAnswer: A,C,D,E

October 11, 2022 No Comments READ MORE +

Which of the following tools are used for enumeration? (Choose three.)

Which of the following tools are used for enumeration? (Choose three.)A . SolarWinds B. USER2SID C. Cheops D. SID2USER E. DumpSecView AnswerAnswer: B,D,E

October 11, 2022 No Comments READ MORE +

Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning tree B. Dynamic ARP Inspection (DAI) C. Port security D. Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...

October 11, 2022 No Comments READ MORE +