All of the following could be used to prevent shoulder surfing, except:
All of the following could be used to prevent shoulder surfing, except:
Which of the following is an incorrect mapping between the type of test and associated characteristic?
Christine needs to have several types of vulnerabilities identified and reviewed. Which of the following is an incorrect mapping between the type of test and associated characteristic?
i. Network Scanning – Enumerates the network structure and determines the set of active hosts and associated software
ii. Wardialing – Detects unauthorized modems and prevents unauthorized access to a protected network
iii. War Driving – Detects unauthorized wireless modems and prevents unauthorized access to a protected network
iv. Penetration Testing – Determines how vulnerable an organization’s network is to scan and the level of damage that can be incurred
Which of the following is the type of test that Steve needs to request?
Steve needs to have an external team carry out a penetration test on his company’s network and personnel. Which of the following is the type of test that Steve needs to request?
Which of the following would be carried out if the assessors have been given the network’s schematic?
The penetration testing team can have varying degrees of knowledge about the penetration target before the tests are actually carried out. Which of the following would be carried out if the assessors have been given the network’s schematic?
Which of the following is not a characteristic of storage area networks?
Which of the following is not a characteristic of storage area networks?
_________________ uses hard disk and optical or tape jukebox technology to offer continuous online backup func
_________________ uses hard disk and optical or tape jukebox technology to offer continuous online backup functionality
Which of the following has the correct definition mapping?
Which of the following has the correct definition mapping?
Which of the following is not a proper characteristic of configuration management?
Which of the following is not a proper characteristic of configuration management?
Which of the following has an incorrect definition mapping?
Which of the following has an incorrect definition mapping?
i.Shareware is software that is publicly available free of charge and can be used, copied, studied, modified, and redistributed without restriction.
ii. Freeware is used by vendors to market their software.
iii. Commercial software is software that is sold for or serves commercial purposes
iv. Academic software is software that is provided for academic purposes at a reduced cost. It can be open source, freeware, or commercial software.
__________________ is a method of taking over a Web user session by surreptitiously obtaining the session ID a
__________________ is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
