Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?
Which of the following password hashing algorithms is used in the NTLMv2 authentication
mechanism?
Identify the attack represented in the diagram below:
Which of the following is developed to address security concerns on time and reduce the misuse or threat of at
Which of the following is developed to address security concerns on time and reduce the
misuse or threat of attacks in an organization?
Which of the following equipment could a pen tester use to perform shoulder surfing?
Which of the following equipment could a pen tester use to perform shoulder surfing?
What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt
The term social engineering is used to describe the various tricks used to fool people
(employees, business partners, or customers) into voluntarily giving away information that
would not normally be known to the general public.
What is the criminal practice of social engineering where an attacker uses the telephone
system in an attempt to scam the user into surrendering private information?
Which of the following acts is a proprietary information security standard for organizations that handle cardh
Which of the following acts is a proprietary information security standard for organizations
that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and
POS cards and applies to all entities involved in payment card processing?
Which among the following information is not furnished by the Rules of Engagement (ROE) document?
Which among the following information is not furnished by the Rules of Engagement (ROE)
document?
Which of the following attacks is this?
An attacker injects malicious query strings in user input fields to bypass web service
authentication mechanisms and to access back-end databases. Which of the following
attacks is this?
Identify the type of authentication mechanism represented below:
Which of the following is the location of the host file in Window system directory?
John, a penetration tester from a pen test firm, was asked to collect information about the
host file in a Windows system directory. Which of the following is the location of the host file
in Window system directory?