which of the following types of testing?
An IT auditor tests an application as an authenticated user. This is an example of which of the
following types of testing?
Which of the following is the developer performing when testing the application?
A software development company has hired a programmer to develop a plug-in module to an
existing proprietary application. After completing the module, the developer needs to test the entire
application to ensure that the module did not introduce new vulnerabilities. Which of the following
is the developer performing when testing the application?
The security administrator is determining the:
A set of standardized system images with a pre-defined set of applications is used to build enduser workstations. The security administrator has scanned every workstation to create a current
inventory of all applications that are installed on active workstations and is documenting which
applications are out-of-date and could be exploited. The security administrator is determining the:
Which of the following does this describe?
On a train, an individual is watching a proprietary video on Joe’s laptop without his knowledge.
Which of the following does this describe?
Which of the following devices is used for the transparent security inspection of…?
Which of the following devices is used for the transparent security inspection of network traffic by
redirecting user packets prior to sending the packets to the intended destination?
Which of the following BEST describes the compromised system?
An administrator is investigating a system that may potentially be compromised, and sees the
following log entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 8 packets.
Which of the following BEST describes the compromised system?
Which of the following BEST describes this attack?
The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud.
No one else received the voice mail. Which of the following BEST describes this attack?
Which of the following has the potential to cause the MOST amount of damage if the account was compromised?
An administrator was asked to review user accounts. Which of the following has the potential to
cause the MOST amount of damage if the account was compromised?
which of the following application attacks?
Failure to validate the size of a variable before writing it to memory could result in which of the
following application attacks?
Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organizati
During a disaster recovery planning session, a security administrator has been tasked with
determining which threats and vulnerabilities pose a risk to the organization. Which of the following
should the administrator rate as having the HIGHEST frequency of risk to the organization?