What type of alert is the IDS giving?
A recent security audit revealed that there were indeed several occasions that the company’s network was
breached. After investigating, you discover that your IDS is not configured properly and therefore is unable to
trigger alarms when needed. What type of alert is the IDS giving?
Which type of cryptography does SSL, IKE and PGP belongs to?
Which type of cryptography does SSL, IKE and PGP belongs to?
Which AAA protocol would you implement?
Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business
expansion and it requires that your network authenticate users connecting using analog modems, Digital
Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relaynetwork. Which AAA protocol would you implement?
what Software design flaw?
A hacker was able to easily gain access to a website. He was able to log in via the frontend user login form of
the website using default or commonly used credentials. This exploitation is an example of what Software
design flaw?
What Web browser-based security vulnerability got explo…
While performing online banking using a Web browser, Kyle receives an email that contains an image of a wellcrafted art. Upon clicking the image, a new tab on the web browser opens and shows an animated GIF of bills
and coins being swallowed by a crocodile. After several days, Kyle noticed that all his funds on the bank was
gone. What Web browser-based security vulnerability got exploited by the hacker?
What is the issue here?
invictus@victim_server:~$ nmap -T4 -0 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!
Obviously, it is not going through. What is the issue here?
which IPSec mode should you implement?
When security and confidentiality of data within the same LAN is of utmost priority, which IPSec mode should
you implement?
Which of the following is a vulnerability in GNU’s bash…
Which of the following is a vulnerability in GNU’s bash shell (discovered in September of 2014) that gives
attackers access to run remote commands on a vulnerable system?
Which of the following is a restriction being enforced …
Which of the following is a restriction being enforced in “white box testing?”
Which specific element of security testing is being ass…
Which specific element of security testing is being assured by using hash?