A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the m…
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrators computer to update the router configuration. What type of an alert is this?
While performing data validation of web content, a security technician is required to restrict malicious input
While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-viru
A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several v
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
A security analyst is performing an audit on the network to determine if there are any deviations from the sec
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT dep…
When creating a security program, which approach would be used if senior management is supporting and enforcin
When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
Which of the following processes evaluates the adherence of an organization to its stated security policy?
Which of the following processes evaluates the adherence of an organization to its stated security policy?
A security consultant is trying to bid on a large contract that involves penetration testing and reporting. Th
A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely…