PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

what changes should the client company make?

Refer to the Exhibit

Paulette works for an IT security consulting company that is currently performing an audit for the
firm ACE Unlimited. Paulette’s duties include logging on to all the company’s network equipment to

ensure IOS versions are up-to-date and all the other security settings are as stringent as possible.
Paulette presents the following screenshot to her boss so he can inform the client about necessary
changes need to be made. From the screenshot, what changes should the client company make?
Exhibit:

What have you found?

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based
on HTML, DHTML, and other web-based languages and how they have evolved over the years.
You navigate to archive.org and view the HTML code of news.com. You then navigate to the
current news.com website and copy over the source code. While searching through the code, you
come across something abnormal:
<img src=http://coolwebsearch.com/ads/pixel.news.com width=1 height=1 border=0>
What have you found?

What have you discovered?

You are a security analyst performing a penetration tests for a company in the Midwest. After
some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the
company. You type in the following URL that includes the IP address of one of the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What
have you discovered?

What is he testing at this point?

Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the
following command. What is he testing at this point?
#include <stdio.h>
#include <string.h>
int main(int argc, char *argv[])
{
char buffer[10];
if (argc < 2)
{
fprintf(stderr, “USAGE: %s string\n”, argv[0]);
return 1;
}
strcpy(buffer, argv[1]);

return 0;
}

What organization should Frank submit the log to find out if it is a new vulnerability or not?

Frank is working on a vulnerability assessment for a company on the West coast. The company
hired Frank to assess its network security through scanning, pen tests, and vulnerability
assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he
set up, he notices a number of items that show up as unknown but questionable in the logs. He
looks up the behavior on the Internet, but cannot find anything related. What organization should
Frank submit the log to find out if it is a new vulnerability or not?


Page 251 of 555« First...102030...249250251252253...260270280...Last »