Filters
Question type

Study Flashcards

An administrator needs to view packets and decode and analyze their contents.What type of application should the administrator use?


A) application analyzer
B) protocol analyzer
C) threat profiler
D) system analyzer

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?


A) application search
B) application control
C) firewall monitoring
D) virus control

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

The second step in a vulnerability assessment is to determine the assets that need to be protected.

A) True
B) False

Correct Answer

verifed

verified

What is the name of the process that basically takes a snapshot of the current security of an organization?


A) threat analysis
B) vulnerability appraisal
C) risk assessment
D) threat assessment

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following groups categorize the risks associated with the use of private data? (Choose all that apply. )


A) Statistical inferences.
B) Associations with groups.
C) Private and consumer data
D) Individual inconveniences and identity theft.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

List at least four things that a vulnerability scanner can do.

Correct Answer

verifed

verified

A vulnerability scanner can do the follo...

View Answer

Which of the following is the goal of a vulnerability scan? (Choose all that apply. )


A) identify vulnerabilities
B) identify common misconfigurations
C) identify threat actors
D) identify a lack of security controls

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic,yet they are imitations of real data files?


A) port scanner
B) honeynet
C) honeypot
D) honeycomb

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

If a penetration tester has gained access to a network and then tries to move around inside the network to other resources,what procedure is the tester performing?


A) pivot
B) spinning
C) persistence
D) secondary exploitation

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which item below is the standard security checklist against which systems are evaluated for a security posture?


A) profile
B) threat
C) control
D) baseline

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What process addresses how long data must be kept and how it is to be secured?


A) legal retention
B) data retention
C) legal and compliance
D) data methodology

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What process does a penetration tester rely on to access an ever higher level of resources?


A) pivot
B) spinning
C) persistence
D) continuous exploitation

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

C

Describe a penetration testing report.

Correct Answer

verifed

verified

The end product of a penetration test is...

View Answer

List and describe the three categories that TCP/IP divides port numbers into.

Correct Answer

verifed

verified

Well-known port numbers (0-1023).Reserve...

View Answer

Explain the concepts of personal data theft and identity theft.

Correct Answer

verifed

verified

Personal data theft involves user person...

View Answer

In white box and gray box testing,the first task of the tester is to perform preliminary information gathering on their own from outside the organization,sometimes called open source intelligence (OSINT).

A) True
B) False

Correct Answer

verifed

verified

False

Discuss one type of asset that an organization might have.

Correct Answer

verifed

verified

An organization has many different types...

View Answer

What term is defined as the state or condition of being free from public attention to the degree that you determine?


A) freedom
B) secure
C) privacy
D) contentment

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?


A) active
B) passive
C) invasive
D) evasive

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

B

During a vulnerability assessment,what type of software can be used to search a system for port vulnerabilities?


A) threat scanner
B) vulnerability profiler
C) port scanner
D) application profiler

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer