Solutions
Save
Practice questions for this set
Learn 1 /7 Study with Learn
Passive wiretap
Choose an answer
Ethical hackers must obtain _________________ prior to performing a scanning and vulnerability
1
assessment on a live production network.
2 Which one of the following is the best example of an authorization control?
Tony is working with a law enforcement agency to place a wiretap pursuant to a legitimate
3 court corder. The wiretap will monitor communications without making any modifications.
What type of wiretap is Tony placing?
Which element of the security policy framework requires approval from upper
4
management and applies to the entire organization?
Don't know?
Terms in this set (167)
,Ethical hackers must obtain written authorization from the client
_________________ prior to
performing a scanning and
vulnerability assessment on
a live production network.
Holly would like to run an Parallel test
annual major disaster
recovery test that is as
thorough and realistic as
possible. She also wants to
ensure that there is no
disruption of activity at the
primary site. What option is
best in this scenario?
During which phase of a Reconnaissance
hacker's five-step approach
does the hacker scan a
network to identify IP hosts,
open ports, and services
enabled on servers and
workstations?
In which type of attack Session hijacking
does the attacker attempt
to take over an existing
connection between two
systems?
Which element of the Policy
security policy framework
requires approval from
upper management and
applies to the entire
organization?
Which of the following Nessus
interfaces enables you to
scan several IP addresses at
once or type in an IP
address to create a simple
scan of any machine?
,Which of the following is a Wireshark
protocol analyzer tool
(sometimes called a
"packet sniffer") that is used
to capture IP traffic from a
variety of sources?
Which one of the following Mean time to repair (MTTR)
measures the average
amount of time that it takes
to repair a system,
application, or
component?
During the vulnerability Nessus
assessment, any known
vulnerabilities or bugs will
be flagged and identified
by:
Which organization pursues Internet Engineering Task Force
standards for Internet of
Things (IoT) devices and is
widely recognized as the
authority for creating
standards on the Internet?
Which of the following is FileZilla
used to transfer files using
the File Transfer Protocol
(FTP) to and from the
vWorkstation?
Tony is working with a law Passive wiretap
enforcement agency to
place a wiretap pursuant to
a legitimate court corder.
The wiretap will monitor
communications without
making any modifications.
What type of wiretap is
Tony placing?
, Which compliance Federal Information Security Management Act (FISMA)
obligation includes security
requirements that apply
specifically to federal
government agencies in the
United States?
Which one of the following Access control lists
is the best example of an
authorization control?
Which security control is Applying strong encryption
most helpful in protecting
against eavesdropping on
wireless LAN (WLAN) data
transmissions that would
jeopardize confidentiality?
Which type of denial of Logic attack
service attack exploits the
existence of software flaws
to disrupt a service?
Which of the following NetWitness Investigator
allows analysts to view and
analyze network packet
traces?
Maria's company recently Opportunity cost
experienced a major
system outage due to the
failure of a critical
component. During that
time period, the company
did not register any sales
through its online site.
Which type of loss did the
company experience as a
result of lost sales?
Which of the following is Zenmap
used to perform a scan of
the network and create a
network topology chart?