Which of the following is the reason the malicious user is able to intercept and see the clear text communicat
An employee connects a wireless access point to the only jack in the conference room to provide Internet
access during a meeting. The access point is configured to use WPA2-TKIP. A malicious user is able to
intercept clear text HTTP communication between the meeting attendees and the Internet. Which of the
following is the reason the malicious user is able to intercept and see the clear text communication?
Which of the following password attacks is MOST likely to crack the largest number of randomly generated passw
Which of the following password attacks is MOST likely to crack the largest number of randomly
generated passwords?
Which of the following attacks involves the use of previously captured network traffic?
Which of the following attacks involves the use of previously captured network traffic?
which of the following?
An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the
recipient to a malicious site where information is harvested. The message is narrowly tailored so it is
effective on only a small number of victims. This describes which of the following?
Which of the following attacks does this prevent?
An administrator is instructed to disable IP-directed broadcasts on all routers in an organization. Which of
the following attacks does this prevent?
Which of the following fingerprint types would this solution use?
An administrator has to determine host operating systems on the network and has deployed a
transparent proxy. Which of the following fingerprint types would this solution use?
Which of the following could have aided the investigation?
An internal audit has detected that a number of archived tapes are missing from secured storage. There
was no recent need for restoration of data from the missing tapes. The location is monitored by access
control and CCTV systems. Review of the CCTV system indicates that it has not been recording for three
months. The access control system shows numerous valid entries into the storage location during that
time. The last audit was six months ago and the tapes were accounted for at that time. Which of the
following could have aided the investigation?
Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:
Methods to test the responses of software and web applications to unusual or unexpected inputs are
known as:
Which of the following application security testing techniques is implemented when an automated system generat
Which of the following application security testing techniques is implemented when an automated
system generates random input data?
which are then used to perform boundary testing?
Which of the following security concepts identifies input variables which are then used to perform
boundary testing?