Which of the following attacks is taking place?
A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to
connect to it. Only after an authorized client has connected and the hacker was able to capture the
client handshake with the AP can the hacker begin a brute force attack to discover the encryption
key. Which of the following attacks is taking place?
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following provides dedicated hardware-based cryptographic functions to an operating system and it
Which of the following provides dedicated hardware-based cryptographic functions to an operating
system and its applications running on laptops and desktops?
Which of the following tests a number of security controls in the least invasive manner?
Which of the following tests a number of security controls in the least invasive manner?
which of the following should the end user protect from compromise?
When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
Which of the following disaster recovery strategies has the highest cost and shortest recovery time?
Which of the following disaster recovery strategies has the highest cost and shortest recovery
time?
Which of the following would include the MOST detail on these objectives?
In the case of a major outage or business interruption, the security office has documented the
expected loss of earnings, potential fines and potential consequence to customer service. Which
of the following would include the MOST detail on these objectives?
Which of the following has MOST likely occurred?
After visiting a website, a user receives an email thanking them for a purchase which they did not
request. Upon investigation the security administrator sees the following source code in a pop-up
window:
<HTML>
<body onload=”document.getElementByID(‘badForm’).submit()”>
<form id=”badForm” action=”shoppingsite.company.com/purchase.php” method=”post”
<input name=”Perform Purchase” value=”Perform Purchase” />
</form></body></HTML>
Which of the following has MOST likely occurred?
Which of the following ports should be used by a system administrator to securely manage a remote server?
Which of the following ports should be used by a system administrator to securely manage a
remote server?
Which of the following ports is used to securely transfer files between remote UNIX systems?
Which of the following ports is used to securely transfer files between remote UNIX systems?