What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

October 3, 2023 No Comments READ MORE +

What testing method did you use?

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with...

October 3, 2023 No Comments READ MORE +

Which of the following best describes this type of system?

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?A . A biometric system that bases authentication decisions on behavioral attributes.B . A biometric system that bases authentication decisions on physical attributes.C . An authentication system...

October 3, 2023 No Comments READ MORE +

Which regulation defines security and privacy controls for Federal information systems and organizations?

Which regulation defines security and privacy controls for Federal information systems and organizations?A . HIPAAB . EU Safe HarborC . PCI-DSSD . NIST-800-53View AnswerAnswer: D Explanation: NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems except those related to national security....

October 2, 2023 No Comments READ MORE +

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor".

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs: From the above list identify the user account with System Administrator privileges.A . JohnB . RebeccaC . SheelaD . ShawnE . SomiaF . ChangG . MicahView AnswerAnswer: F

October 2, 2023 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

October 2, 2023 No Comments READ MORE +

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?A . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.B . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.C . Symmetric encryption allows...

October 2, 2023 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

October 2, 2023 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

October 2, 2023 No Comments READ MORE +

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?A . NiktoB . John the RipperC . DsniffD . SnortView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Nikto_(vulnerability_scanner) Nikto is a free software command-line vulnerability scanner that scans web servers for dangerous files/CGIs, outdated server software, and other...

October 2, 2023 No Comments READ MORE +