Which of the following techniques will identify if computer files have been changed?
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?
Which security control role does encryption meet?
Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?
A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am.
Which of the following programming languages would most likely be used?
What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
What results will the following command yielD. 'NMAP -sS -O -p 123-153 192.168.100.3'?
Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
Which of the following cryptography attack methods is usually performed without the use of a computer?
Advanced encryption standard is an algorithm used for which of the following?
Which of the following business challenges could be solved by using a vulnerability scanner?
Which of the following examples best represents a logical or technical control?
A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?