Which of the following did the developer MOST likely implement?
A new client application developer wants to ensure that the encrypted passwords that are stored in
their database are secure from cracking attempts. To implement this, the developer implements a
function on the client application that hashes passwords thousands of times prior to being sent to
the database. Which of the following did the developer MOST likely implement?
Which of the following could Ann implement to help identify accounts that are still active for terminated empl
Ann, a security analyst, has discovered that her company has very high staff turnover and often
user accounts are not disabled after an employee leaves the company. Which of the following
could Ann implement to help identify accounts that are still active for terminated employees?
Which of the following will Joe need to use to BEST accomplish the objective?
Joe must send Ann a message and provide Ann with assurance that he was the actual sender.
Which of the following will Joe need to use to BEST accomplish the objective?
which of the following ports?
Signed digital certificates used to secure communication with a web server are MOST commonly
associated with which of the following ports?
Which of the following attacks involves the use of previously captured network traffic?
Which of the following attacks involves the use of previously captured network traffic?
which of the following?
An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the
recipient to a malicious site where information is harvested. The message is narrowly tailored so it
is effective on only a small number of victims. This describes which of the following?
which of the following?
Verifying the integrity of data submitted to a computer program at or during run-time, with the
intent of preventing the malicious exploitation of unintentional effects in the structure of the code,
is BEST described as which of the following?
Which of the following attacks does this prevent?
An administrator is instructed to disable IP-directed broadcasts on all routers in an organization.
Which of the following attacks does this prevent?
Which of the following BEST describes the type of system Ann is installing?
Ann, the system administrator, is installing an extremely critical system that can support ZERO
downtime. Which of the following BEST describes the type of system Ann is installing?
Which of the following fingerprint types would this solution use?
An administrator has to determine host operating systems on the network and has deployed a
transparent proxy. Which of the following fingerprint types would this solution use?