PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

Vulnerability mapping occurs after which phase of a penetration test?

Vulnerability mapping occurs after which phase of a penetration test?

What kind of attack is Susan carrying on?

Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?

How do you prevent DNS spoofing?

Let’s imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company. How do you prevent DNS spoofing? (Select the Best Answer.)


Page 27 of 150« First...1020...2526272829...405060...Last »