What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 5, 2025 No Comments READ MORE +

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...

February 4, 2025 No Comments READ MORE +

Which of the following is being described?

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?A . Multi-cast modeB . Promiscuous modeC . WEMD...

February 4, 2025 No Comments READ MORE +

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?A . Preparation phaseB . Containment phaseC . Identification phaseD . Recovery phaseView AnswerAnswer: A

February 3, 2025 No Comments READ MORE +

What is this type of DNS configuration commonly called?

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network. What is this type of DNS configuration commonly called?A . DynDNSB . DNS SchemeC . DNSSECD . Split DNSView AnswerAnswer: D

February 3, 2025 No Comments READ MORE +

Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?A . HoneypotsB . FirewallsC . Network-based intrusion detection system (NIDS)D . Host-based intrusion detection system (HIDS)View AnswerAnswer: C

February 3, 2025 No Comments READ MORE +

What is the best Nmap command you will use?

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use?A . nmap -T4 -q 10.10.0.0/24B . nmap -T4 -F 10.10.0.0/24C . nmap -T4 -r 10.10.1.0/24D . nmap...

February 3, 2025 No Comments READ MORE +

What is the minimum number of network connections in a multihomed firewall?

What is the minimum number of network connections in a multihomed firewall?A . 3B . 5C . 4D . 2View AnswerAnswer: A

February 1, 2025 No Comments READ MORE +

This proves that CompanyXYZ’s email gateway doesn’t prevent what?

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks...

January 31, 2025 No Comments READ MORE +

Which of the following is the BEST way to defend against network sniffing?

Which of the following is the BEST way to defend against network sniffing?A . Using encryption protocols to secure network communicationsB . Register all machines MAC Address in a Centralized DatabaseC . Use Static IP AddressD . Restrict Physical Access to Server Rooms hosting Critical ServersView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Sniffing_attack...

January 30, 2025 No Comments READ MORE +