Which of the following tools will he use to accomplish his task?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully performed the following steps of the pre-attack phase to check the security of the We-are-secure network: Gathering information
Determining the network range Identifying active systems Now, he wants to find the open ports
and applications running on the network. Which of the following tools will he use to accomplish his
task?
Which of the following NIST documents will guide you?
You work as a security engineer for BlueWell Inc. You want to use some techniques and
procedures to verify the effectiveness of security controls in Federal Information System. Which of
the following NIST documents will guide you?
Which policy does this pertain to?
An organization monitors the hard disks of its employees’ computers from time to time. Which
policy does this pertain to?
Which of the following methods will you use to accomplish these tasks?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following
tasks: Develop a risk-driven enterprise information security architecture. Deliver security
infrastructure solutions that support critical business initiatives. Which of the following methods will
you use to accomplish these tasks?
which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS
accepts the data packet but the host computer rejects it?
What are the different types of policies?
A security policy is an overall general statement produced by senior management that dictates
what role security plays within the organization. What are the different types of policies? Each
correct answer represents a complete solution. Choose all that apply.
Which of the following are the types of intellectual property?
Which of the following are the types of intellectual property? Each correct answer represents a
complete solution. Choose all that apply.
which of the following phases of the SDLC does the software and other components of the system …?
In which of the following phases of the SDLC does the software and other components of the
system faithfully incorporate the design specifications and provide proper documentation and
training?
Which of the following are types of security controls?
Security controls are safeguards or countermeasures to avoid, counteract, or minimize security
risks. Which of the following are types of security controls? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following will you use to resolve the issue?
You work as a Security Manager for Tech Perfect Inc. You find that some applications have failed
to encrypt network traffic while ensuring secure communications in the organization. Which of the
following will you use to resolve the issue?