What is the name of the attack which is mentioned in the scenario?

Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is...

October 4, 2023 No Comments READ MORE +

What tool should the analyst use to perform a Blackjacking attack?

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing C Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str......

October 3, 2023 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 3, 2023 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

October 3, 2023 No Comments READ MORE +

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?A . symmetric algorithmsB . asymmetric algorithmsC . hashing algorithmsD . integrity algorithmsView AnswerAnswer: C

October 3, 2023 No Comments READ MORE +

Which of the following tools can be used to perform a zone transfer?

Which of the following tools can be used to perform a zone transfer?A . NSLookupB . FingerC . DigD . Sam SpadeE . HostF . NetcatG . NeotraceView AnswerAnswer: A,C,D,E

October 3, 2023 No Comments READ MORE +

What is the first step that the bank should take before enabling the audit feature?

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?A . Perform a vulnerability scan of the system.B . Determine the impact of enabling...

October 3, 2023 No Comments READ MORE +

Which type of security feature stops vehicles from crashing through the doors of a building?

Which type of security feature stops vehicles from crashing through the doors of a building?A . BollardsB . ReceptionistC . MantrapD . TurnstileView AnswerAnswer: A

October 3, 2023 No Comments READ MORE +

Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning treeB . Dynamic ARP Inspection (DAI)C . Port securityD . Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...

October 3, 2023 No Comments READ MORE +

What two conditions must a digital signature meet?

What two conditions must a digital signature meet?A . Has to be the same number of characters as a physical signature and must be unique.B . Has to be unforgeable, and has to be authentic.C . Must be unique and have special characters.D . Has to be legible and neat.View...

October 3, 2023 No Comments READ MORE +