<< Prev Question Next Question >>

Question 29/84

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (84q)
Question 1: By using a smart card and pin, you are using a two-factor au...
Question 2: In which of the following password protection technique, ran...
Question 3: Security Policy is a definition of what it means to be secur...
Question 4: You are a Penetration Tester and are assigned to scan a serv...
Question 5: Alice encrypts her data using her public key PK and stores t...
Question 6: A technician is resolving an issue where a computer is unabl...
Question 7: Look at the following output. What did the hacker accomplish...
Question 8: Bob, your senior colleague, has sent you a mail regarding aa...
Question 9: Bob learned that his username and password for a popular gam...
Question 10: Which of the following attacks exploits web age vulnerabilit...
Question 11: What two conditions must a digital signature meet?...
Question 12: Which of the following statements is TRUE?...
Question 13: Which of the following incident handling process phases is r...
Question 14: A large mobile telephony and data network operator has a dat...
Question 15: The following is part of a log file taken from the machine o...
Question 16: Why should the security analyst disable/remove unnecessary I...
Question 17: What is the least important information when you analyze a p...
1 commentQuestion 18: In which of the following cryptography attack methods, the a...
Question 19: Assume a business-crucial web-site of some company that is u...
Question 20: The establishment of a TCP connection involves a negotiation...
Question 21: You have successfully comprised a server having an IP addres...
Question 22: Which of the following is considered an exploit framework an...
Question 23: ........is an attack type for a rogue Wi-Fi access point tha...
Question 24: You need a tool that can do network intrusion prevention and...
Question 25: Shellshock allowed an unauthorized user to gain access to a ...
Question 26: A tester has been hired to do a web application security tes...
Question 27: Which is the first step followed by Vulnerability Scanners f...
Question 28: Based on the below log, which of the following sentences are...
Question 29: A regional bank hires your company to perform a security ass...
Question 30: What term describes the amount of risk that remains after th...
Question 31: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 32: You are attempting to run an Nmap port scan on a web server....
Question 33: As an Ethical Hacker you are capturing traffic from your cus...
Question 34: An IT employee got a call from one of our best customers. Th...
Question 35: Which type of security feature stops vehicles from crashing ...
Question 36: What does a firewall check to prevent particular ports and a...
Question 37: You have successfully compromised a machine on the network a...
Question 38: On performing a risk assessment, you need to determine the p...
Question 39: Due to a slowdown of normal network operations, the IT depar...
Question 40: Which of the following Nmap commands will produce the follow...
Question 41: You are working as a Security Analyst in a company XYZ that ...
Question 42: An attacker, using a rogue wireless AP, performed an MITM at...
Question 43: Internet Protocol Security IPSec is actually a suite of prot...
Question 44: In Risk Management, how is the term "likelihood" related to ...
Question 45: Which of the following areas is considered a strength of sym...
Question 46: Which of the following antennas is commonly used in communic...
Question 47: You want to analyze packets on your wireless network. Which ...
Question 48: What is the most common method to exploit the "Bash Bug" or ...
Question 49: An attacker scans a host with the below command. Which three...
Question 50: A hacker has managed to gain access to a Linux host and stol...
Question 51: When you are testing a web application, it is very useful to...
Question 52: A security analyst is performing an audit on the network to ...
Question 53: A new wireless client is configured to join an 802.11 networ...
Question 54: Which tier in the N-tier application architecture is respons...
Question 55: To determine if a software program properly handles a wide r...
Question 56: John the Ripper is a technical assessment tool used to test ...
Question 57: Firewalls are the software or hardware systems that are able...
Question 58: Which of the following programs is usually targeted at Micro...
Question 59: Which of the following is an adaptive SQL Injection testing ...
Question 60: Jimmy is standing outside a secure entrance to a facility. H...
Question 61: An attacker is using nmap to do a ping sweep and a port scan...
Question 62: A bank stores and processes sensitive privacy information re...
Question 63: A network administrator discovers several unknown files in t...
Question 64: Some clients of TPNQM SA were redirected to a malicious site...
Question 65: You are the Network Admin, and you get a compliant that some...
Question 66: If you want only to scan fewer ports than the default scan u...
Question 67: You are monitoring the network of your organizations. You no...
Question 68: Which of the following provides a security professional with...
Question 69: Scenario: 1. Victim opens the attacker's web site. 2. Attack...
Question 70: DNS cache snooping is a process of determining if the specif...
Question 71: Cryptography is the practice and study of techniques for sec...
Question 72: Which component of IPsec performs protocol-level functions t...
Question 73: What is correct about digital signatures?...
Question 74: A hacker named Jack is trying to compromise a bank's compute...
Question 75: The collection of potentially actionable, overt, and publicl...
Question 76: Which of the following programming languages is most suscept...
Question 77: Which of the following security policies defines the use of ...
Question 78: What is attempting an injection attack on a web server based...
Question 79: During a recent security assessment, you discover the organi...
Question 80: An enterprise recently moved to a new office and the new nei...
Question 81: You perform a scan of your company's network and discover th...
Question 82: This asymmetry cipher is based on factoring the product of t...
Question 83: Which Nmap option would you use if you were not concerned ab...
Question 84: Which of the following will perform an Xmas scan using NMAP?...