<< Prev Question Next Question >>

Question 59/65

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (65q)
Question 1: Which of the following will perform an Xmas scan using NMAP?...
Question 2: You have gained physical access to a Windows 2008 R2 server ...
Question 3: Which of the following attacks exploits web age vulnerabilit...
1 commentQuestion 4: Which of the following statements is TRUE?...
1 commentQuestion 5: A hacker has managed to gain access to a Linux host and stol...
Question 6: Which of the following Secure Hashing Algorithm (SHA) produc...
4 commentQuestion 7: In which of the following cryptography attack methods, the a...
Question 8: A company's Web development team has become aware of a certa...
Question 9: Which of the following security policies defines the use of ...
Question 10: Steve, a scientist who works in a governmental security agen...
Question 11: A technician is resolving an issue where a computer is unabl...
Question 12: An attacker, using a rogue wireless AP, performed an MITM at...
Question 13: The following is part of a log file taken from the machine o...
Question 14: In Risk Management, how is the term "likelihood" related to ...
Question 15: Which Intrusion Detection System is the best applicable for ...
Question 16: Which of the following is a serious vulnerability in the pop...
Question 17: What would you enter, if you wanted to perform a stealth sca...
Question 18: From the following table, identify the wrong answer in terms...
Question 19: During a recent security assessment, you discover the organi...
Question 20: Which of the following provides a security professional with...
Question 21: Some clients of TPNQM SA were redirected to a malicious site...
Question 22: Websites and web portals that provide web services commonly ...
Question 23: Insecure direct object reference is a type of vulnerability ...
Question 24: Internet Protocol Security IPSec is actually a suite of prot...
Question 25: Which of these is capable of searching for and locating rogu...
2 commentQuestion 26: If you want only to scan fewer ports than the default scan u...
Question 27: This tool is an 802.11 WEP and WPA-PSK keys cracking program...
Question 28: The collection of potentially actionable, overt, and publicl...
Question 29: An attacker scans a host with the below command. Which three...
Question 30: You are the Network Admin, and you get a compliant that some...
Question 31: What term describes the amount of risk that remains after th...
Question 32: Why should the security analyst disable/remove unnecessary I...
Question 33: Assume a business-crucial web-site of some company that is u...
Question 34: Which of the following types of jailbreaking allows user-lev...
Question 35: If a tester is attempting to ping a target that exists but r...
Question 36: Which of the following antennas is commonly used in communic...
Question 37: What type of vulnerability/attack is it when the malicious p...
Question 38: Identify the web application attack where the attackers expl...
Question 39: Which of the following is an adaptive SQL Injection testing ...
Question 40: Due to a slowdown of normal network operations, the IT depar...
Question 41: Security Policy is a definition of what it means to be secur...
Question 42: What type of analysis is performed when an attacker has part...
Question 43: Code injection is a form of attack in which a malicious user...
Question 44: When does the Payment Card Industry Data Security Standard (...
Question 45: Which protocol is used for setting up secure channels betwee...
Question 46: What is the most common method to exploit the "Bash Bug" or ...
Question 47: You need a tool that can do network intrusion prevention and...
Question 48: This asymmetry cipher is based on factoring the product of t...
Question 49: To determine if a software program properly handles a wide r...
Question 50: In which of the following password protection technique, ran...
Question 51: Which one of the following Google advanced search operators ...
Question 52: On performing a risk assessment, you need to determine the p...
Question 53: You are monitoring the network of your organizations. You no...
Question 54: What is attempting an injection attack on a web server based...
Question 55: The establishment of a TCP connection involves a negotiation...
Question 56: What is not a PCI compliance recommendation?...
Question 57: You are doing an internal security audit and intend to find ...
Question 58: A hacker is an intelligent individual with excellent compute...
Question 59: Which component of IPsec performs protocol-level functions t...
Question 60: Which Nmap option would you use if you were not concerned ab...
Question 61: Which tool allows analysts and pen testers to examine links ...
Question 62: What is the least important information when you analyze a p...
Question 63: You are attempting to run an Nmap port scan on a web server....
Question 64: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 65: Bob, your senior colleague, has sent you a mail regarding aa...