<< Prev Question Next Question >>

Question 123/177

Websites and web portals that provide web services commonly use the Simple Object Access Protocol
(SOAP). Which of the following is an incorrect definition or characteristics of the protocol?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (177q)
Question 1: Which Nmap option would you use if you were not concerned ab...
Question 2: You are attempting to man-in-the-middle a session. Which pro...
Question 3: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 4: In Risk Management, how is the term "likelihood" related to ...
Question 5: Which of the following incident handling process phases is r...
Question 6: Cryptography is the practice and study of techniques for sec...
Question 7: Which method of password cracking takes the most time and ef...
Question 8: A large company intends to use Blackberry for corporate mobi...
Question 9: You are a security officer of a company. You had an alert fr...
Question 10: Emil uses nmap to scan two hosts using this command: nmap -s...
Question 11: Which of the following Bluetooth hacking techniques does an ...
Question 12: On performing a risk assessment, you need to determine the p...
Question 13: What is a "Collision attack" in cryptography?...
Question 14: You have successfully comprised a server having an IP addres...
Question 15: Rebecca commonly sees an error on her Windows system that st...
Question 16: Some clients of TPNQM SA were redirected to a malicious site...
Question 17: An IT employee got a call from one our best customers. The c...
Question 18: WPA2 uses AES for wireless data encryption at which of the f...
Question 19: An attacker with access to the inside network of a small com...
Question 20: The following is part of a log file taken from the machine o...
Question 21: It has been reported to you that someone has caused an infor...
Question 22: A regional bank hires your company to perform a security ass...
Question 23: You are a Penetration Tester and are assigned to scan a serv...
Question 24: Which security strategy requires using several, varying meth...
Question 25: Bob, your senior colleague, has sent you a mail regarding aa...
Question 26: You just set up a security system in your network. In what k...
Question 27: Which service in a PKI will vouch for the identity of an ind...
Question 28: Jesse receives an email with an attachment labeled "Court_No...
Question 29: PGP, SSL, and IKE are all examples of which type of cryptogr...
Question 30: What is the most secure way to mitigate the theft of corpora...
Question 31: What two conditions must a digital signature meet?...
Question 32: Why containers are less secure that virtual machine?...
Question 33: You need a tool that can do network intrusion prevention and...
Question 34: Which of the following statements is FALSE with respect to I...
Question 35: Elliot is in the process of exploiting a web application tha...
Question 36: Why should the security analyst disable/remove unnecessary I...
Question 37: Which Metasploit Framework tool can help penetration tester ...
Question 38: When analyzing the IDS logs, the system administrator notice...
Question 39: Which of the following programs is usually targeted at Micro...
Question 40: If you want only to scan fewer ports than the default scan u...
Question 41: Steve, a scientist who works in a governmental security agen...
Question 42: Firewalk has just completed the second phase (the scanning p...
Question 43: As a Certified Ethical Hacker, you were contracted by a priv...
Question 44: It is an entity or event with the potential to adversely imp...
Question 45: Scenario: 1. Victim opens the attacker's web site. 2. Attack...
Question 46: The "white box testing" methodology enforces what kind of re...
Question 47: Sam is working as s pen-tester in an organization in Houston...
Question 48: In many states sending spam is illegal. Thus, the spammers h...
Question 49: In order to have an anonymous Internet surf, which of the fo...
Question 50: Which of the following antennas is commonly used in communic...
Question 51: Which of the following Nmap commands will produce the follow...
Question 52: Which of the following security policies defines the use of ...
Question 53: As an Ethical Hacker you are capturing traffic from your cus...
Question 54: env x='(){ :;};echo exploit' bash -c 'cat/etc/passwd' What i...
Question 55: The establishment of a TCP connection involves a negotiation...
Question 56: Which tier in the N-tier application architecture is respons...
Question 57: What does a firewall check to prevent particular ports and a...
Question 58: Which of the following is a component of a risk assessment?...
Question 59: Which tool allows analysts and pen testers to examine links ...
Question 60: What is the difference between the AES and RSA algorithms?...
Question 61: Which one of the following Google advanced search operators ...
Question 62: You are logged in as a local admin on a Windows 7 system and...
Question 63: In an internal security audit, the white hat hacker gains co...
Question 64: Which access control mechanism allows for multiple systems t...
Question 65: If executives are found liable for not properly protecting t...
Question 66: Your company was hired by a small healthcare provider to per...
Question 67: Bob learned that his username and password for a popular gam...
Question 68: You are performing a penetration test for a client and have ...
Question 69: Which mode of IPSec should you use to assure security and co...
Question 70: An IT employee got a call from one of our best customers. Th...
Question 71: When conducting a penetration test, it is crucial to use all...
Question 72: What is the least important information when you analyze a p...
Question 73: An attacker is trying to redirect the traffic of a small off...
Question 74: An incident investigator asks to receive a copy of the event...
Question 75: The company ABC recently contracted a new accountant. The ac...
Question 76: A company's Web development team has become aware of a certa...
Question 77: Shellshock allowed an unauthorized user to gain access to a ...
Question 78: What is correct about digital signatures?...
Question 79: In IPv6 what is the major difference concerning application ...
Question 80: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 81: Which of the following scanning method splits the TCP header...
Question 82: Port scanning can be used as part of a technical assessment ...
Question 83: A penetration test was done at a company. After the test, a ...
Question 84: An unauthorized individual enters a building following an em...
Question 85: The "black box testing" methodology enforces what kind of re...
Question 86: Which Intrusion Detection System is the best applicable for ...
Question 87: To maintain compliance with regulatory requirements, a secur...
Question 88: Insecure direct object reference is a type of vulnerability ...
Question 89: Code injection is a form of attack in which a malicious user...
Question 90: An enterprise recently moved to a new office and the new nei...
Question 91: (Exhibit) What is the code written for?...
Question 92: An attacker changes the profile information of a particular ...
Question 93: You want to do an ICMP scan on a remote computer using hping...
1 commentQuestion 94: Bob, a network administrator at BigUniversity, realized that...
Question 95: Risks=Threats x Vulnerabilities is referred to as the:...
Question 96: An attacker is using nmap to do a ping sweep and a port scan...
Question 97: Which of the following can the administrator do to verify th...
Question 98: What is the role of test automation in security testing?...
Question 99: Which of the following is the successor of SSL?...
Question 100: You are tasked to perform a penetration test. While you are ...
Question 101: A new wireless client is configured to join an 802.11 networ...
Question 102: Firewalls are the software or hardware systems that are able...
Question 103: Assume a business-crucial web-site of some company that is u...
Question 104: You are monitoring the network of your organizations. You no...
Question 105: When you are testing a web application, it is very useful to...
Question 106: Which of the following is a serious vulnerability in the pop...
Question 107: A Security Engineer at a medium-sized accounting firm has be...
Question 108: Gavin owns a white-hat firm and is performing a website secu...
Question 109: An LDAP directory can be used to store information similar t...
1 commentQuestion 110: You are the Network Admin, and you get a compliant that some...
Question 111: You have successfully gained access to a Linux server and wo...
Question 112: Which of the following options represents a conceptual chara...
1 commentQuestion 113: During an Xmas scan, what indicates a port is closed?...
Question 114: Which of the following will perform an Xmas scan using NMAP?...
Question 115: Which of the following is one of the most effective ways to ...
Question 116: The security administrator of ABC needs to permit Internet t...
Question 117: A penetration tester is conducting a port scan on a specific...
Question 118: Your team has won a contract to infiltrate an organization. ...
Question 119: _________ is a set of extensions to DNS that provide to DNS ...
Question 120: Which of the following types of jailbreaking allows user-lev...
Question 121: While using your bank's online servicing you notice the foll...
Question 122: Internet Protocol Security IPSec is actually a suite of prot...
Question 123: Websites and web portals that provide web services commonly ...
Question 124: A large mobile telephony and data network operator has a dat...
Question 125: During a recent security assessment, you discover the organi...
Question 126: A company's Web development team has become aware of a certa...
Question 127: Bob finished a C programming course and created a small C ap...
Question 128: Which regulation defines security and privacy controls for F...
Question 129: Security Policy is a definition of what it means to be secur...
Question 130: A virus that attempts to install itself inside the file it i...
Question 131: What mechanism in Windows prevents a user from accidentally ...
Question 132: You are an Ethical Hacker who is auditing the ABC company. W...
Question 133: Which of the following program infects the system boot secto...
Question 134: An attacker attaches a rogue router in a network. He wants t...
Question 135: (Exhibit) What does the option * indicate?...
Question 136: Which of the following areas is considered a strength of sym...
Question 137: Which of the following viruses tries to hide from anti-virus...
Question 138: The purpose of a _______is to deny network access to local a...
Question 139: Eve stole a file named secret.txt, transferred it to her com...
Question 140: Bob received this text message on his mobile phone: "Hello, ...
Question 141: Tremp is an IT Security Manager, and he is planning to deplo...
Question 142: What attack is used to crack passwords by using a precompute...
Question 143: While performing online banking using a Web browser, a user ...
Question 144: Which of the following Secure Hashing Algorithm (SHA) produc...
Question 145: You are looking for SQL injection vulnerability by sending a...
Question 146: You are performing information gathering for an important pe...
Question 147: You are analyzing a traffic on the network with Wireshark. Y...
Question 148: During a black-box pen test you attempt to pass IRC traffic ...
Question 149: Which of these options is the most secure procedure for stor...
Question 150: By using a smart card and pin, you are using a two-factor au...
Question 151: What does the -oX flag do in an Nmap scan?...
Question 152: Which utility will tell you in real time which ports are lis...
Question 153: Which system consists of a publicly available set of databas...
Question 154: In both pharming and phishing attacks an attacker can create...
Question 155: Based on the below log, which of the following sentences are...
Question 156: Which of the following is the structure designed to verify a...
Question 157: Which of the following is an adaptive SQL Injection testing ...
Question 158: What kind of detection techniques is being used in antivirus...
Question 159: A hacker has successfully infected an internet-facing server...
Question 160: You have gained physical access to a Windows 2008 R2 server ...
Question 161: Matthew, a black hat, has managed to open a meterpreter sess...
Question 162: Which of the following programming languages is most suscept...
Question 163: Jimmy is standing outside a secure entrance to a facility. H...
Question 164: Which is the first step followed by Vulnerability Scanners f...
Question 165: Which regulation defines security and privacy controls for F...
Question 166: What is attempting an injection attack on a web server based...
Question 167: What type of vulnerability/attack is it when the malicious p...
Question 168: There are several ways to gain insight on how a cryptosystem...
Question 169: DNS cache snooping is a process of determining if the specif...
Question 170: Seth is starting a penetration test from inside the network....
Question 171: A well-intentioned researcher discovers a vulnerability on t...
Question 172: The network in ABC company is using the network address 192....
Question 173: Ricardo wants to send secret messages to a competitor compan...
Question 174: What is the purpose of a demilitarized zone on a network?...
Question 175: The Open Web Application Security Project (OWASP) is the wor...
Question 176: In which of the following password protection technique, ran...
Question 177: Which of the following is assured by the use of a hash?...