which phase?
In the software security development life cycle process, threat modeling occurs in which phase?
What is the most secure way to mitigate the theft of co…
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel
room?
Which of the following is an issue with the situation?
A Network Administrator was recently promoted to Chief Security Officer at a local university. One of
employee’s new responsibilities is to manage the implementation of an RFID card access system to a new
server room on campus. The server room will house student enrollment information that is securely backed up
to an off-site location.
During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the
existing security controls have not been designed properly. Currently, the Network Administrator is responsible
for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs
on a weekly basis.
Which of the following is an issue with the situation?
Which of the following is a strong post designed to sto…
Which of the following is a strong post designed to stop a car?
Which of the following cryptography attack methods is u…
Which of the following cryptography attack methods is usually performed without the use of a computer?
what was the original message?
A hacker was able to sniff packets on a company’s wireless network. The following information was discovered:
The Key 10110010 01001011
The Cyphertext 01100101 01011010
Using the Exlcusive OR, what was the original message?
Which of the following is an example of an asymmetric e…
Which of the following is an example of an asymmetric encryption implementation?
What conclusions can be drawn based on these scan results?
Firewalk has just completed the second phase (the scanning phase) and a technician receives the output
shown below. What conclusions can be drawn based on these scan results?
TCP port 21 – no response
TCP port 22 – no response
TCP port 23 – Time-to-live exceeded
which type of packet inspection is the firewall conducting?
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the
DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection
is the firewall conducting?
Which of the following types of firewall inspects only …
Which of the following types of firewall inspects only header information in network traffic?