Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft
Windows products?
Which of the statements concerning proxy firewalls is correct?
Which of the statements concerning proxy firewalls is correct?
Which of the following is an example of two factor authentication?
Which of the following is an example of two factor authentication?
Which of the following is likely to occur as a result?
A security consultant is trying to bid on a large contract that involves penetration testing and
reporting. The company accepting bids wants proof of work so the consultant prints out several
audits that have been performed. Which of the following is likely to occur as a result?
which of the following is likely to be installed on the target machine by the OS?
A penetration tester is conducting a port scan on a specific host. The tester found several ports
opened that were confusing in concluding the Operating System (OS) version installed.
Considering the NMAP result below, which of the following is likely to be installed on the target
machine by the OS?
Starting NMAP 5.21 at 2011-03-15 11:06
NMAP scan report for 172.16.40.65
Host is up (1.00s latency).
Not shown: 993 closed ports
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
139/tcp open netbios-ssn
515/tcp open
631/tcp open ipp
9100/tcp open
MAC Address: 00:00:48:0D:EE:89
What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?
What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234″?
which key?
For messages sent through an insecure channel, a properly implemented digital signature gives
the receiver reason to believe the message was sent by the claimed sender. While using a digital
signature, the message digest is encrypted with which key?
which device would enable the capture of all traffic on the wire?
When using Wireshark to acquire packet capture on a network, which device would enable the
capture of all traffic on the wire?
Which method can provide a better return on IT security investment and provide a thorough and comprehensive as
Which method can provide a better return on IT security investment and provide a thorough and
comprehensive assessment of organizational security covering policy, procedure design, and
implementation?
How does an operating system protect the passwords used for account logins?
How does an operating system protect the passwords used for account logins?