During penetration testing, you are required to use a c…
You are a security consultant who is required to perform penetration testing on a client’s network. During
penetration testing, you are required to use a compromised system to attack other systems on the network to
avoid network restrictions like firewalls.Which method would you use in this scenario:
Common Criteria 15408 generally outlines assurance and …
Common Criteria 15408 generally outlines assurance and functional requirements through a security evaluation
process concept of ______________, ____________, __________ for Evaluated Assurance Levels (EALs) to
certify a product or system.
Which of the following statements pertaining to ethical…
Which of the following statements pertaining to ethical hacking is NOT true?
Which of the following is NOT a valid reason to use ext…
Which of the following is NOT a valid reason to use external penetration service firms rather than corporate
resources?
Which of the following is NOT a technique used to perfo…
Which of the following is NOT a technique used to perform a penetration test?
Which of the following testing method examines the func…
Which of the following testing method examines the functionality of an application without peering into its
internal structure or knowing the details of its internals?
Which type of password provides maximum security becaus…
Which type of password provides maximum security because a new password is required for each new log-on?
To control access by a subject (an active entity such a…
To control access by a subject (an active entity such as individual or process) to an object (a passive entity
such as a file) involves setting up:
What ensures that the control mechanisms correctly impl…
What ensures that the control mechanisms correctly implement the security policy for the entire life cycle of an
information system?
Which of the following attack is also known as Time of …
Which of the following attack is also known as Time of Check(TOC)/Time of Use(TOU)?