Backing up data is a security must. However, it also has certain level of risks when mishandled. Which of the following is the greatest threat posed by backups?
LM hash is a compromised password hashing function. Which of the following parameters describe LM Hash:?
I β The maximum password length is 14 characters.
II β There are no distinctions between uppercase and lowercase.
III β Itβs a simple algorithm, so 10,000,000 hashes can be generated per second.
Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?
Which tool would be used to collect wireless packet data?
A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?
Which command line switch would be used in NMAP to perform operating system detection?
Fingerprinting VPN firewalls is possible with which of the following tools?
Which security control role does encryption meet?
Which of the following parameters enables NMAP's operating system detection feature?
When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
One way to defeat a multi-level security solution is to leak data via
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?