<< Prev Question Next Question >>

Question 45/195

Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for improved speed and secure key exchange. What is the encryption software employed by Sam for securing the email messages?

Recent Comments (The most recent comments are at the top.)

yassine - Jan 14, 2024

A- GPG is likely the answer.
GPG is a software replacement of PGP and free implementation of the OpenPGP standard.
it uses both symmetric key cryptography and asymmetric key cryptography.

yassine - Jan 14, 2024

C- GPG is likely the answer.
GPG is a software replacement of PGP and free implementation of the OpenPGP standard.
it uses both symmetric key cryptography and asymmetric key cryptography.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (195q)
Question 1: The configuration allows a wired or wireless network interfa...
Question 2: You went to great lengths to install all the necessary techn...
Question 3: what is the port to block first in case you are suspicious t...
Question 4: Emily, an extrovert obsessed with social media, posts a larg...
Question 5: What is the most common method to exploit the "Bash Bug" or ...
Question 6: What is the following command used for? net use \targetipc$ ...
Question 7: To create a botnet. the attacker can use several techniques ...
Question 8: in this form of encryption algorithm, every Individual block...
Question 9: Shiela is an information security analyst working at HiTech ...
Question 10: You are using a public Wi-Fi network inside a coffee shop. B...
Question 11: The network administrator at Spears Technology, Inc has conf...
Question 12: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 13: Windows LAN Manager (LM) hashes are known to be weak. Which ...
Question 14: Steve, a scientist who works in a governmental security agen...
Question 15: In the field of cryptanalysis, what is meant by a "rubber-ho...
Question 16: What would you enter if you wanted to perform a stealth scan...
Question 17: The Heartbleed bug was discovered in 2014 and is widely refe...
Question 18: When a normal TCP connection starts, a destination host rece...
Question 19: How does a denial-of-service attack work?...
Question 20: Which system consists of a publicly available set of databas...
Question 21: Which of the following are well known password-cracking prog...
Question 22: Which of the following is not a Bluetooth attack?...
Question 23: Which tool can be used to silently copy files from USB devic...
Question 24: While using your bank's online servicing you notice the foll...
Question 25: Peter, a system administrator working at a reputed IT firm, ...
Question 26: Mirai malware targets loT devices. After infiltration, it us...
Question 27: Todd has been asked by the security officer to purchase a co...
Question 28: Shellshock allowed an unauthorized user to gain access to a ...
Question 29: Calvin, a software developer, uses a feature that helps him ...
Question 30: You have retrieved the raw hash values from a Windows 2000 D...
Question 31: Although FTP traffic is not encrypted by default, which laye...
Question 32: which of the following Bluetooth hacking techniques refers t...
Question 33: A zone file consists of which of the following Resource Reco...
Question 34: Which of the following commands checks for valid users on an...
Question 35: Which iOS jailbreaking technique patches the kernel during t...
Question 36: A newly joined employee. Janet, has been allocated an existi...
Question 37: Andrew is an Ethical Hacker who was assigned the task of dis...
Question 38: What port number is used by LDAP protocol?...
Question 39: Matthew, a black hat, has managed to open a meterpreter sess...
Question 40: During an Xmas scan what indicates a port is closed?...
Question 41: Sam is a penetration tester hired by Inception Tech, a secur...
Question 42: which of the following information security controls creates...
Question 43: Roma is a member of a security team. She was tasked with pro...
Question 44: John wants to send Marie an email that includes sensitive in...
2 commentQuestion 45: Sam, a web developer, was instructed to incorporate a hybrid...
Question 46: Which of the following is considered an exploit framework an...
Question 47: Bob is going to perform an active session hijack against Bro...
Question 48: An attacker runs netcat tool to transfer a secret file betwe...
Question 49: Based on the below log, which of the following sentences are...
Question 50: You are analysing traffic on the network with Wireshark. You...
Question 51: What does the -oX flag do in an Nmap scan?...
Question 52: In both pharming and phishing attacks, an attacker can creat...
Question 53: Allen, a professional pen tester, was hired by xpertTech sol...
Question 54: Why would you consider sending an email to an address that y...
Question 55: You have gained physical access to a Windows 2008 R2 server ...
Question 56: Techno Security Inc. recently hired John as a penetration te...
Question 57: Peter is surfing the internet looking for information about ...
Question 58: You have the SOA presented below in your Zone. Your secondar...
Question 59: Widespread fraud ac Enron. WorldCom, and Tyco led to the cre...
Question 60: Jim, a professional hacker, targeted an organization that is...
Question 61: Security administrator John Smith has noticed abnormal amoun...
Question 62: Which of the following statements is TRUE?...
Question 63: A hacker has successfully infected an internet-facing server...
Question 64: What is the algorithm used by LM for Windows2000 SAM?...
Question 65: While examining audit logs, you discover that people are abl...
Question 66: Which of the following LM hashes represent a password of les...
Question 67: Tony wants to integrate a 128-bit symmetric block cipher wit...
Question 68: which type of virus can change its own code and then cipher ...
Question 69: Which of the following allows attackers to draw a map or out...
Question 70: Henry is a penetration tester who works for XYZ organization...
Question 71: John, a professional hacker, targeted an organization that u...
Question 72: Which of the following viruses tries to hide from anti-virus...
Question 73: Samuel, a professional hacker, monitored and Intercepted alr...
Question 74: An attacker identified that a user and an access point are b...
Question 75: What is the proper response for a NULL scan if the port is c...
Question 76: One of your team members has asked you to analyze the follow...
Question 77: Johnson, an attacker, performed online research for the cont...
Question 78: John is an incident handler at a financial institution. His ...
Question 79: In the context of password security, a simple dictionary att...
Question 80: Tony is a penetration tester tasked with performing a penetr...
Question 81: When conducting a penetration test, it is crucial to use all...
Question 82: Harper, a software engineer, is developing an email applicat...
Question 83: This type of injection attack does not show any error messag...
Question 84: Bella, a security professional working at an it firm, finds ...
Question 85: You are a penetration tester working to test the user awaren...
Question 86: Which DNS resource record can indicate how long any "DNS poi...
Question 87: Peter, a Network Administrator, has come to you looking for ...
Question 88: Which type of security feature stops vehicles from crashing ...
Question 89: Which of the following antennas is commonly used in communic...
Question 90: Session splicing is an IDS evasion technique in which an att...
Question 91: John, a professional hacker, decided to use DNS to perform d...
Question 92: Bob received this text message on his mobile phone: "Hello, ...
Question 93: Your organization has signed an agreement with a web hosting...
Question 94: You just set up a security system in your network. In what k...
Question 95: You are logged in as a local admin on a Windows 7 system and...
Question 96: Nedved is an IT Security Manager of a bank in his country. O...
Question 97: John, a security analyst working for an organization, found ...
Question 98: CompanyXYZ has asked you to assess the security of their per...
Question 99: Hackers often raise the trust level of a phishing message by...
Question 100: Which of the following is a low-tech way of gaining unauthor...
Question 101: By performing a penetration test, you gained access under a ...
Question 102: what is the correct way of using MSFvenom to generate a reve...
Question 103: How can rainbow tables be defeated?...
Question 104: ViruXine.W32 virus hides their presence by changing the unde...
Question 105: Susan, a software developer, wants her web API to update oth...
Question 106: Jude, a pen tester working in Keiltech Ltd., performs sophis...
Question 107: Ethical backer jane Doe is attempting to crack the password ...
Question 108: What is the known plaintext attack used against DES which gi...
Question 109: _________ is a tool that can hide processes from the process...
Question 110: _________ is a type of phishing that targets high-profile ex...
Question 111: The following is an entry captured by a network IDS. You are...
Question 112: Clark, a professional hacker, was hired by an organization l...
Question 113: SQL injection (SQLi) attacks attempt to inject SQL syntax in...
Question 114: A penetration tester is performing the footprinting process ...
Question 115: In this attack, a victim receives an e-mail claiming from Pa...
Question 116: Firewalls are the software or hardware systems that are able...
Question 117: Larry, a security professional in an organization, has notic...
Question 118: The establishment of a TCP connection involves a negotiation...
Question 119: Nathan is testing some of his network devices. Nathan is usi...
Question 120: Susan has attached to her company's network. She has managed...
Question 121: Which of the following is the BEST way to defend against net...
Question 122: There are multiple cloud deployment options depending on how...
Question 123: Which of the following Metasploit post-exploitation modules ...
Question 124: what firewall evasion scanning technique make use of a zombi...
Question 125: What type of a vulnerability/attack is it when the malicious...
Question 126: You need a tool that can do network intrusion prevention and...
Question 127: Which of the following represents the initial two commands t...
Question 128: Every company needs a formal written document which spells o...
Question 129: You are the Network Admin, and you get a complaint that some...
Question 130: As a securing consultant, what are some of the things you wo...
Question 131: The change of a hard drive failure is once every three years...
Question 132: Take a look at the following attack on a Web Server using ob...
Question 133: You are programming a buffer overflow exploit and you want t...
Question 134: Kevin, an encryption specialist, implemented a technique tha...
Question 135: Which rootkit is characterized by its function of adding cod...
Question 136: Which of the following statements about a zone transfer is c...
Question 137: Yancey is a network security administrator for a large elect...
Question 138: Elliot is in the process of exploiting a web application tha...
Question 139: To invisibly maintain access to a machine, an attacker utili...
Question 140: OpenSSL on Linux servers includes a command line tool for te...
Question 141: A network admin contacts you. He is concerned that ARP spoof...
Question 142: John, a professional hacker, targeted CyberSol Inc., an MNC....
Question 143: The network team has well-established procedures to follow f...
Question 144: Which of the following tools are used for enumeration? (Choo...
Question 145: Jason, an attacker, targeted an organization to perform an a...
Question 146: Steve, an attacker, created a fake profile on a social media...
Question 147: A user on your Windows 2000 network has discovered that he c...
Question 148: You are attempting to crack LM Manager hashed from Windows 2...
Question 149: A large company intends to use Blackberry for corporate mobi...
Question 150: Attacker Simon targeted the communication network of an orga...
Question 151: Which type of malware spreads from one system to another or ...
Question 152: The security administrator of ABC needs to permit Internet t...
Question 153: Which of the following is a component of a risk assessment?...
Question 154: A computer science student needs to fill some information in...
Question 155: Jack, a professional hacker, targets an organization and per...
Question 156: While testing a web application in development, you notice t...
Question 157: Joel, a professional hacker, targeted a company and identifi...
Question 158: This form of encryption algorithm is asymmetric key block ci...
Question 159: If a tester is attempting to ping a target that exists but r...
Question 160: Which of the following is assured by the use of a hash?...
Question 161: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 162: A security analyst is performing an audit on the network to ...
Question 163: A security analyst uses Zenmap to perform an ICMP timestamp ...
Question 164: Which Nmap option would you use if you were not concerned ab...
Question 165: Joseph was the Web site administrator for the Mason Insuranc...
Question 166: You have compromised a server on a network and successfully ...
Question 167: If a token and 4-digit personal identification number (PIN) ...
Question 168: Henry Is a cyber security specialist hired by BlackEye - Cyb...
Question 169: Consider the following Nmap output: (Exhibit) what command-l...
Question 170: What is the first step for a hacker conducting a DNS cache p...
Question 171: Thomas, a cloud security professional, is performing securit...
Question 172: What two conditions must a digital signature meet?...
Question 173: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 174: What piece of hardware on a computer's motherboard generates...
Question 175: What type of virus is most likely to remain undetected by an...
Question 176: What tool can crack Windows SMB passwords simply by listenin...
Question 177: Wilson, a professional hacker, targets an organization for f...
Question 178: What is the file that determines the basic configuration (sp...
Question 179: You are trying to break into a highly classified top-secret ...
Question 180: PGP, SSL, and IKE are all examples of which type of cryptogr...
Question 181: Which of the following DoS tools is used to attack target we...
Question 182: Upon establishing his new startup, Tom hired a cloud service...
Question 183: Kate dropped her phone and subsequently encountered an issue...
Question 184: Kevin, a professional hacker, wants to penetrate CyberTech I...
Question 185: What term describes the amount of risk that remains after th...
Question 186: Ricardo has discovered the username for an application in hi...
Question 187: Email is transmitted across the Internet using the Simple Ma...
Question 188: Cross-site request forgery involves:...
Question 189: A company's security policy states that all Web browsers mus...
Question 190: You have successfully comprised a server having an IP addres...
Question 191: Which of the following is a passive wireless packet analyzer...
Question 192: jane invites her friends Alice and John over for a LAN party...
Question 193: Bob is acknowledged as a hacker of repute and is popular amo...
Question 194: Which of the following incident handling process phases is r...
Question 195: You have compromised a server and successfully gained a root...