<< Prev Question Next Question >>

Question 75/150

Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?

Recent Comments (The most recent comments are at the top.)

TCW - Aug 31, 2020

Answer B is the correct one according to ECSAv10

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: Vulnerability assessment is an examination of the ability of...
Question 2: A framework for security analysis is composed of a set of in...
Question 3: You have compromised a lower-level administrator account on ...
Question 4: You are conducting a penetration test against a company and ...
Question 5: The Internet is a giant database where people store some of ...
Question 6: Which of the following will not handle routing protocols pro...
Question 7: Which of the following is an application alert returned by a...
Question 8: Which of the following policy forbids everything with strict...
Question 9: When you are running a vulnerability scan on a network and t...
Question 10: Which of the following is a framework of open standards deve...
Question 11: Nessus can test a server or a network for DoS vulnerabilitie...
Question 12: Hackers today have an ever-increasing list of weaknesses in ...
Question 13: What sort of vulnerability assessment approach starts by bui...
Question 14: A penetration tester tries to transfer the database from the...
Question 15: Phishing is typically carried out by email spoofing or insta...
Question 16: One of the steps in information gathering is to run searches...
Question 17: Which of the following defines the details of services to be...
Question 18: What are placeholders (or markers) in an HTML document that ...
Question 19: Snort, an open source network-based intrusion detection sens...
Question 20: Identify the type of firewall represented in the diagram bel...
Question 21: Which of the following password hashing algorithms is used i...
Question 22: Passwords protect computer resources and files from unauthor...
Question 23: Which of the following are the default ports used by NetBIOS...
Question 24: Rules of Engagement (ROE) document provides certain rights a...
Question 25: Which of the following methods is used to perform server dis...
1 commentQuestion 26: From where can clues about the underlying application enviro...
Question 27: Which one of the following is false about Wireshark? (Select...
Question 28: In the TCP/IP model, the transport layer is responsible for ...
Question 29: TCP/IP model is a framework for the Internet Protocol suite ...
Question 30: Identify the person who will lead the penetration-testing pr...
Question 31: DMZ is a network designed to give the public access to the s...
Question 32: Many security and compliance projects begin with a simple id...
Question 33: TCP/IP provides a broad range of communication protocols for...
Question 34: What is the difference between penetration testing and vulne...
Question 35: In the process of hacking a web application, attackers manip...
Question 36: A man enters a PIN number at an ATM machine, being unaware t...
Question 37: Which one of the following components of standard Solaris Sy...
Question 38: Application security assessment is one of the activity that ...
Question 39: Which among the following information is not furnished by th...
Question 40: A directory traversal (or path traversal) consists in exploi...
1 commentQuestion 41: Which of the following acts related to information security ...
Question 42: Which one of the following tools of trade is a commercial sh...
Question 43: Timing is an element of port-scanning that can catch one una...
Question 44: A firewall protects networked computers from intentional hos...
Question 45: Identify the attack represented in the diagram below: (Exhib...
Question 46: Which of the following is not the SQL injection attack chara...
Question 47: John, the penetration testing manager in a pen testing firm,...
Question 48: Which one of the following is a useful formatting token that...
Question 49: A penetration test will show you the vulnerabilities in the ...
Question 50: Identify the framework that comprises of five levels to guid...
Question 51: In the example of a /etc/passwd file below, what does the bo...
Question 52: Packet filtering firewalls are usually a part of a router. I...
Question 53: A penetration test consists of three phases: pre-attack phas...
Question 54: What threat categories should you use to prioritize vulnerab...
Question 55: Attackers create secret accounts and gain illegal access to ...
Question 56: Which of the following protocols cannot be used to filter Vo...
Question 57: Which of the following appendices gives detailed lists of al...
1 commentQuestion 58: Which of the following statement holds true for TCP Operatio...
Question 59: What is a goal of the penetration testing report? (Exhibit)...
Question 60: Which one of the following log analysis tools is a Cisco Rou...
Question 61: Which one of the following components of standard Solaris Sy...
Question 62: What is the maximum value of a "tinyint" field in most datab...
Question 63: In which of the following IDS evasion techniques does IDS re...
Question 64: Which of the following is NOT related to the Internal Securi...
Question 65: What are the 6 core concepts in IT security? (Exhibit)...
Question 66: Metasploit framework in an open source platform for vulnerab...
Question 67: Nessus can test a server or a network for DoS vulnerabilitie...
Question 68: External penetration testing is a traditional approach to pe...
Question 69: Variables are used to define parameters for detection, speci...
Question 70: Identify the injection attack represented in the diagram bel...
Question 71: Which one of the following 802.11 types has WLAN as a networ...
Question 72: Output modules allow Snort to be much more flexible in the f...
Question 73: What are the scanning techniques that are used to bypass fir...
Question 74: Firewall and DMZ architectures are characterized according t...
1 commentQuestion 75: Which of the following is developed to address security conc...
Question 76: Today, most organizations would agree that their most valuab...
Question 77: What is a difference between host-based intrusion detection ...
Question 78: Which one of the following acts related to the information s...
Question 79: Identify the type of testing that is carried out without giv...
Question 80: Which of the following policies helps secure data and protec...
Question 81: Why is a legal agreement important to have before launching ...
Question 82: You work as an IT security auditor hired by a law firm in Bo...
Question 83: Which vulnerability assessment phase describes the scope of ...
Question 84: The amount of data stored in organizational databases has in...
Question 85: A pen tester has extracted a database name by using a blind ...
Question 86: Identify the data security measure which defines a principle...
Question 87: Which of the following attacks does a hacker perform in orde...
Question 88: The Web parameter tampering attack is based on the manipulat...
Question 89: The IP protocol was designed for use on a wide variety of tr...
Question 90: Rule of Engagement (ROE) is the formal permission to conduct...
Question 91: By default, the TFTP server listens on UDP port 69. Which of...
Question 92: Mason is footprinting an organization to gather competitive ...
Question 93: Which one of the following is a command line tool used for c...
Question 94: Internet Control Message Protocol (ICMP) messages occur in m...
Question 95: An external intrusion test and analysis identify security we...
Question 96: A chipset is a group of integrated circuits that are designe...
Question 97: This is a group of people hired to give details of the vulne...
Question 98: Identify the policy that defines the standards for the organ...
Question 99: The SnortMain() function begins by associating a set of hand...
Question 100: John, a penetration tester, was asked for a document that de...
Question 101: What information can be collected by dumpster diving?...
Question 102: Which of the following policies states that the relevant app...
Question 103: Software firewalls work at which layer of the OSI model?...
Question 104: Which one of the following tools of trade is an automated, c...
Question 105: A Demilitarized Zone (DMZ) is a computer host or small netwo...
Question 106: Which of the following is the objective of Gramm-Leach-Blile...
Question 107: In the context of penetration testing, what does blue teamin...
Question 108: DNS information records provide important data about:...
Question 109: Which of the following approaches to vulnerability assessmen...
Question 110: Which of the following protocol's traffic is captured by usi...
Question 111: Internet Control Message Protocol (ICMP) messages occur in m...
Question 112: Before performing the penetration testing, there will be a p...
Question 113: Which type of security policy applies to the below configura...
Question 114: Transmission control protocol accepts data from a data strea...
Question 115: Traceroute is a computer network diagnostic tool for display...
Question 116: Port numbers are used to keep track of different conversatio...
1 commentQuestion 117: Wireshark is a network analyzer. It reads packets from the n...
Question 118: Which type of vulnerability assessment tool provides securit...
Question 119: In a TCP packet filtering firewall, traffic is filtered base...
Question 120: Windows stores user passwords in the Security Accounts Manag...
Question 121: How many bits is Source Port Number in TCP Header packet?...
Question 122: Port numbers are used to keep track of different conversatio...
Question 123: Which of the following statements is true about the LM hash?...
Question 124: A wireless intrusion detection system (WIDS) monitors the ra...
Question 125: James is testing the ability of his routers to withstand DoS...
Question 126: An automated electronic mail message from a mail system whic...
Question 127: Which one of the following 802.11 types uses either FHSS or ...
Question 128: SQL injection attack consists of insertion or "injection" of...
Question 129: An attacker injects malicious query strings in user input fi...
Question 130: Which Wireshark filter displays all the packets where the IP...
Question 131: Which of the following shields Internet users from artificia...
Question 132: Wireless communication allows networks to extend to places t...
Question 133: Transmission Control Protocol (TCP) is a connection-oriented...
Question 134: Which one of the following log analysis tools is used for an...
Question 135: Due to illegal inputs, various types of TCP stacks respond i...
Question 136: During external penetration testing, which of the following ...
Question 137: During the process of fingerprinting a web application envir...
Question 138: A Blind SQL injection is a type of SQL Injection attack that...
Question 139: Which of the following scan option is able to identify the S...
Question 140: Which of the following equipment could a pen tester use to p...
Question 141: An antenna is a device that is designed to transmit and rece...
Question 142: Which of the following acts is a proprietary information sec...
Question 143: Amazon, an IT based company, conducts a survey on the usage ...
Question 144: Amazon Consulting Corporation provides penetration testing a...
Question 145: NTP protocol is used to synchronize the system clocks of com...
Question 146: The framework primarily designed to fulfill a methodical and...
Question 147: In which of the following firewalls are the incoming or outg...
Question 148: Which of the following contents of a pen testing project pla...
Question 149: Besides the policy implications of chat rooms, Internet Rela...
2 commentQuestion 150: Identify the transition mechanism to deploy IPv6 on the IPv4...