Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...

February 25, 2025 No Comments READ MORE +

Which of the following describes the characteristics of a Boot Sector Virus?

Which of the following describes the characteristics of a Boot Sector Virus?A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.B . Moves the MBR to another location on the RAM and copies itself to the original location of the...

February 24, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 22, 2025 No Comments READ MORE +

Which method of password cracking takes the most time and effort?

Which method of password cracking takes the most time and effort?A . Dictionary attackB . Shoulder surfingC . Rainbow tablesD . Brute forceView AnswerAnswer: D Explanation: Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends...

February 19, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 17, 2025 No Comments READ MORE +

What kind of vulnerability must be present to make this remote attack possible?

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged...

February 17, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 16, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 14, 2025 No Comments READ MORE +

What will he do next?

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.B . He will activate OSPF on the spoofed root...

February 14, 2025 No Comments READ MORE +

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?A . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.B . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.C . Symmetric encryption allows...

February 9, 2025 No Comments READ MORE +