Which of the following is a design pattern based on distinct pieces ofsoftware providing
application functionality as services to other applications?
A.
Lean Coding
B.
Service Oriented Architecture
C.
Object Oriented Architecture
D.
Agile Process
Service Oriented Architecture
Which of the following tools can be used for passiveOS fingerprinting?
A.
tcpdump
B.
ping
C.
nmap
D.
Tracert
nmap
When you are getting informationabout a web server, it is very important to know the HTTP
Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there
are two critical methods (PUT and DELETE). PUT can upload a file to the server and
DELETE can delete a file from the server. You can detect all these methods (GET, POST,
HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?
A.
http enum
B.
http-git
C.
http-headers
D.
http-methods
http-git
Which of the following statements regarding ethical hacking is incorrect?
A.
Testing should be remotely performed offsite.
B.
Ethical hackers should never use tools that have potential of exploiting vulnerabilities in
the organizations IT system.
C.
Ethical hacking should not involve writing to or modifying the target systems.
D.
An organization should use ethical hackers who do not sell hardware/software or other consulting services.
Ethical hackers should never use tools that have potential of exploiting vulnerabilities in
the organizations IT system.
To maintain compliance with regulatory requirements, a security audit of the systems on a
network must be performed to determine their compliance with security policies. Which one
of the following tools would most likely be used in such as audit?
A.
Port scanner
B.
Protocol analyzer
C.
Vulnerability scanner
D.
Intrusion Detection System
Vulnerability scanner
Page 9 out of 25 Pages |
Previous |