Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?A . Produces less false positivesB . Can identify unknown attacksC . Requires vendor updates for a new threatD . Cannot deal with encrypted network trafficView AnswerAnswer: B

October 22, 2020 No Comments READ MORE +

Which of the following cannot be performed by the passive network sniffing?

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?A . Identifying operating systems, services,...

October 22, 2020 No Comments READ MORE +

In this context, what can you say?

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a...

October 22, 2020 No Comments READ MORE +

If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?

If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?A . -sPB . -PC . -rD . -FView AnswerAnswer: B

October 22, 2020 No Comments READ MORE +

Which one of the following tools the hacker probably used to inject HTML code?

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...

October 22, 2020 No Comments READ MORE +

What type of breach has the individual just performed?

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?A . Reverse Social EngineeringB . TailgatingC . PiggybackingD . AnnouncedView AnswerAnswer: B

October 22, 2020 No Comments READ MORE +

What kind of hackers are we talking about?

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?A . Black-Hat Hackers AB . Script KiddiesC . White-Hat HackersD . Gray-Hat HackerView AnswerAnswer: C

October 21, 2020 1 Comment READ MORE +

Which of the following statements is TRUE?

Which of the following statements is TRUE?A . Sniffers operate on Layer 2 of the OSI modelB . Sniffers operate on Layer 3 of the OSI modelC . Sniffers operate on both Layer 2 & Layer 3 of the OSI model.D . Sniffers operate on the Layer 1 of the...

October 21, 2020 No Comments READ MORE +

What is the main theme of the sub-policies for Information Technologies?

Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is...

October 21, 2020 No Comments READ MORE +

During the process of encryption and decryption, what keys are shared?

During the process of encryption and decryption, what keys are shared?A . Private keysB . User passwordsC . Public keysD . Public and private keysView AnswerAnswer: C

October 21, 2020 No Comments READ MORE +