Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)
In order to show improvement of security over time, what must be developed?
What is the main disadvantage of the scripting languages as opposed to compiled programming languages?
A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and 192.168.5.0. How can NMAP be used to scan these adjacent Class C networks?
Which of the following processes evaluates the adherence of an organization to its stated security policy?
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?
Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)
John the Ripper is a technical assessment tool used to test the weakness of which of the following?
In the software security development life cyle process, threat modeling occurs in which phase?
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen, and then opens a second connection from a forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server. What attacks can you successfully launch against a server using the above technique?
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?
Information gathered from social networking websites such as Facebook, Twitter and LinkedIn can be used to launch which of the following types of attacks? (Choose two.)
The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Which statement best describes a server type under an N-tier architecture?
A pentester gains acess to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
ICMP ping and ping sweeps are used to check for active systems and to check