Which of the following connectors do FireWire 800 devices use?
Which of the following connectors do FireWire 800 devices use?
Which of the following attack types represents this scenario?
Some mobile devices are jail-broken by connecting via USB cable and then exploiting software
vulnerabilities to get kernel-level access. Which of the following attack types represents this
scenario? (Select TWO).
Which of the following are the BEST security considerations to protect data from one customer being disclosed
A security company is developing a new cloud-based log analytics platform. Its purpose is to
allow:
Customers to upload their log files to the “big data” platform
Customers to perform remote log search
Customers to integrate into the platform using an API so that third party business intelligence tools
can be used for the purpose of trending, insights, and/or discovery
Which of the following are the BEST security considerations to protect data from one customer
being disclosed to other customers? (Select THREE).
Which of the following ports are used to connect a keyboard to a computer?
Which of the following ports are used to connect a keyboard to a computer?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following controls has likely been implemented by the developers?
A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a
HTTP intercepting proxy are failing with SSL errors. Which of the following controls has likely been
implemented by the developers?
what the engineer is trying to achieve?
During a software development project review, the cryptographic engineer advises the project
manager that security can be greatly improved by significantly slowing down the runtime of a
hashing algorithm and increasing the entropy by passing the input and salt back during each
iteration. Which of the following BEST describes what the engineer is trying to achieve?
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and Compa
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and
Compact Flash (CF)?
Which of the following should the software engineer implement to best meet the requirements?
The threat abatement program manager tasked the software engineer with identifying the fastest
implementation of a hash function to protect passwords with the least number of collisions. Which
of the following should the software engineer implement to best meet the requirements?
Which of the following storage device uses SRAM or DRAM?
Which of the following storage device uses SRAM or DRAM?
Which of the following BEST describes the technique used by the malware developers?
A security engineer at a bank has detected a Zeus variant, which relies on covert communication
channels to receive new instructions and updates from the malware developers. As a result, NIPS
and AV systems did not detect the configuration files received by staff in emails that appeared as
normal files. Which of the following BEST describes the technique used by the malware
developers?