What is the proper response for a NULL scan if the port is open?
A.
SYN
B.
ACK
C.
FIN
D.
PSH
E.
RST
F.
No response
No response
Why containers are less secure that virtual machines?
A.
Host OS on containers has a larger surface attack.
B.
Containers may full fill disk space of the host.
C.
A compromise container may cause a CPU starvation of the host.
D.
Containers are attached to the same virtual network.
Host OS on containers has a larger surface attack.
An organization is performing a vulnerability assessment tor mitigating threats. James, a
pen tester, scanned the organization by building an inventory of the protocols found on the
organization's machines to detect which ports are attached to services such as an email
server, a web server or a database server. After identifying the services, he selected the
vulnerabilities on each machine and started executing only the relevant tests. What is the
type of vulnerability assessment solution that James employed in the above scenario?
A.
Product-based solutions
B.
Tree-based assessment
C.
Service-based solutions
D.
inference-based assessment
Service-based solutions
PGP, SSL, and IKE are all examples of which type of cryptography?
A.
Digest
B.
Secret Key
C.
Public Key
D.
Hash Algorithm
Public Key
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
A.
The attacker queries a nameserver using the DNS resolver.
B.
The attacker makes a request to the DNS resolver.
C.
The attacker forges a reply from the DNS resolver.
D.
The attacker uses TCP to poison the ONS resofver
The attacker queries a nameserver using the DNS resolver.
Page 5 out of 104 Pages |
Previous |