Which of the following is a preventive control?
Answer : A
Which of the following is considered an acceptable option when managing a risk?
Answer : C
Which security control role does encryption meet?
Answer : A
A covert channel is a channel that
Answer : A
John the Ripper is a technical assessment tool used to test the weakness of which of the following?
Answer : D
Least privilege is a security concept that requires that a user is
Answer : A
If the final set of security controls does not eliminate all risk in a system, what could be done next?
Answer : C
What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?
Answer : D
Which of the following examples best represents a logical or technical control?
Answer : A
Which type of access control is used on a router or firewall to limit network activity?
Answer : C
At a Windows Server command prompt, which command could be used to list the running services?
Answer : C
Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?
Answer : C
While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?
Answer : C
A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:
The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?
Answer : B
A circuit level gateway works at which of the following layers of the OSI Model?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us