A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?
An NMAP scan of a server shows port 25 is open. What risk could this pose?
Which cipher encrypts the plain text digit (bit or byte) one by one?
A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.)
What information should an IT system analysis provide to the risk assessor?
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
An NMAP scan of a server shows port 69 is open. What risk could this pose?
A botnet can be managed through which of the following?
Which system consists of a publicly available set of databases that contain domain name registration contact information?
A newly discovered flaw in a software application would be considered which kind of security vulnerability?
Which set of access control solutions implements two-factor authentication?
During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?