What is the name of the risk assessment method that allows you to study how various types of negative
events (violations, failures or destructions) can affect the main activities of the company and key
business processes?
Emergency Plan Response (EPR)
Business Impact Analysis (BIA)
Disaster Recovery Planning (DRP)
Risk Mitigation - Business Impact Analysis (BIA)
Which of the following services run on TCP port 123 by default?
POP3
DNS
Telnet
NTP - NTP
Jenny, a pentester, conducts events to detect viruses in systems. She uses a detection method where
the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities.
Which of the following methods does Jenny use?
Vulnerability scanner.
Integrity checking.
Code Emulation.
Heuristic Analysis. - Code Emulation.
An attacker stole financial information from a bank by compromising only a single server. After that, the
bank decided to hire a third-party organization to conduct a full security assessment. Cybersecurity
specialists have been provided with information about this case, and they need to provide an initial
recommendation. Which of the following will be the best recommendation?
,Require all employees to change their passwords immediately.
Issue new certificates to the web servers from the root certificate authority.
Move the financial data to another server on the same IP subnet.
Place a front-end web server in a demilitarized zone that only handles external web traffic. - Place a
front-end web server in a demilitarized zone that only handles external web traffic.
Which of the following is a component of IPsec that performs protocol-level functions required to
encrypt and decrypt the packets?
IPsec driver
Oakley
IPsec Policy Agent
Internet Key Exchange (IKE) - IPsec driver
An attacker gained access to a Linux host and stolen the password file from /etc/passwd. Which of the
following scenarios best describes what an attacker can do with this file?
The attacker can perform actions as a user because he can open it and read the user ids and
corresponding passwords.
Nothing because he cannot read the file because it is encrypted.
The attacker can perform actions as root because the file reveals the passwords to the root user only.
Nothing because the password file does not contain the passwords themselves. - Nothing because the
password file does not contain the passwords themselves.
,Which of the following best describes the operation of the Address Resolution Protocol?
It sends a reply packet for a specific IP, asking for the MAC address.
It sends a request packet to all the network elements, asking for the MAC address from a specific IP.
It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.
It sends a request packet to all the network elements, asking for the domain name from a specific IP. - It
sends a request packet to all the network elements, asking for the MAC address from a specific IP.
When getting information about the web server, you should be familiar with methods GET, POST, HEAD,
PUT, DELETE, TRACE. There are two critical methods in this list: PUT (upload a file to the server) and
DELETE (delete a file from the server). When using nmap, you can detect all these methods. Which of
the following nmap scripts will help you detect these methods?
http enum
http-headers
http-methods
http ETag - http-methods
Identify an adaptive SQL Injection testing technique by the description:
A testing technique is used to discover coding errors by inputting massive amounts of random data and
observing the changes in the output.
Dynamic Testing.
Static application security testing.
Functional Testing.
Fuzz Testing. - Fuzz Testing.
In what type of testing does the tester have some information about the internal work of the
application?
, Grey-box
Black-box
White-box
Announced - Grey-box
Identify the structure designed to verify and authenticate the identity of individuals within the
enterprise taking part in a data exchange?
single sign-on
biometrics
SOA
PKI - PKI
Identify the type of attack according to the following scenario:
Ivan, a black-hat hacker, initiates an attack on a certain organization. In preparation for this attack, he
identified a well-known and trust website that employees of this company often use. In the next step,
Ivan embeds an exploit into the website that infects the target systems of employees when using the
website. After this preparation, he can only wait for the successful execution of his attack.
Watering Hole
Shellshock
Spear Phishing
Heartbleed - Watering Hole
Alex, a network administrator, received a warning from IDS about a possibly malicious sequence of
packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS
and saved to a PCAP file. Now Alex needs to determine if these packets are genuinely malicious or
simply a false positive. Which of the following type of network tools will he use?
Intrusion Prevention System (IPS).
Protocol analyzer.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.48. You're not tied to anything after your purchase.