Which of the following items of a computer system will an anti-virus program scan for viruses?
Which of the following items of a computer system will an anti-virus program scan for viruses?
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
Which of the following can take an arbitrary length of input and produce a message digest output
of 160 bit?
Which cryptography attack is the student attempting?
A computer science student needs to fill some information into a secured Adobe PDF job
application that was received from a prospective employer. Instead of requesting a new document
that allowed the forms to be completed, the student decides to write a script that pulls passwords
from a list of commonly used passwords to try against the secured PDF until the correct password
is found or the list is exhausted.
Which cryptography attack is the student attempting?
Which attack could the hacker use to sniff all of the packets in the network?
A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer
program in a switched environment network. Which attack could the hacker use to sniff all of the
packets in the network?
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CS
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request
Forgery (CSRF) vulnerable web application?
Which of the following attacks should be used to obtain the key?
During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which
of the following attacks should be used to obtain the key?
Which tool is used to automate SQL injections and exploit a database by forcing a given web application to con
Which tool is used to automate SQL injections and exploit a database by forcing a given web
application to connect to another database controlled by a hacker?
Which security policy must the security analyst check to see if dial-out modems are allowed?
A security analyst is performing an audit on the network to determine if there are any deviations
from the security policies in place. The analyst discovers that a user from the IT department had a
dial-out modem installed. Which security policy must the security analyst check to see if dial-out
modems are allowed?
What is the most efficient way to crack the passwords for the AD users?
A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient
way to crack the passwords for the AD users?
which of the following?
When an alert rule is matched in a network-based IDS like snort, the IDS does which of the
following?