which option below offers that?
Bob learned that his username and password for a popular game has been compromised. He contacts the
company and resets all the information. The company suggests he use two-factor authentication, which option
below offers that?
Why he cannot see the servers?
The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the
network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124.
An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is:
nmap 192.168.1.64/28.
Why he cannot see the servers?
What is the best protection that will work for her?
Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the
best protection that will work for her?
Which of the following is considered an exploit framewo…
Which of the following is considered an exploit framework and has the ability to perform automated attacks on
services, ports, applications and unpatched security flaws in a computer system?
Which of these is capable of searching for and locating…
Which of these is capable of searching for and locating rogue access points?
Which of the following choices is true about cryptography?
Cryptography is the practice and study of techniques for secure communication in the presence of third parties
(called adversaries.) More generally, it is about constructing and analyzing protocols that overcome the
influence of adversaries and that are related to various aspects in information security such as data
confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the
disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include
ATM cards, computer passwords, and electronic commerce.Basic example to understand how cryptography works is given below:
SECURE (plain text)
+1(+1 next letter, for example, the letter ““T”” is used for ““S”” to encrypt.)
TFDVSF (encrypted text)
+=logic=> Algorithm
1=Factor=> Key
Which of the following choices is true about cryptography?
What is the difference between pharming and phishing at…
In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with
the intent of collecting personal identifiable information from its victims. What is the difference between
pharming and phishing attacks?
What should he do?
A well-intentioned researcher discovers a vulnerability on the web site of a major corporation. What should he
do?
What should this employee do?
An IT employee got a call from one of our best customers. The caller wanted to know about the company’s
network infrastructure, systems, and team. New opportunities of integration are in sight for both company and
customer. What should this employee do?
What is this middle step called?
Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is
tested there. If it passes, then it moves onto Sid. What is this middle step called?