Answers 100% Correct!!
What is the difference between credentialed and non credentialed scanning? * -
ANSWERSCredentialed vulnerability scan you have the credentials to access the
systems in your environment.
Non-credentialed scans can only observe responses from the outside.
Why do we use a WAF? - ANSWERSProtects the web server from malicious web traffic
What are the Bluetooth attacks? *
-Bluejacking
-Blue-snarfing
-Bluebugging
-Blueknifing - ANSWERSBluejacking
Blue-snarfing
Bluebugging
Which Bluetooth attack is sending of unsolicited messages over Bluetooth? *
-Bluejacking
-Blue-snarfing
-Bluebugging
-Blueknifing - ANSWERSBluejacking
An attacker makes processes execute out of sequence to control the result in a way that
accomplishes the attackers goals. *
A. Pre-emptive attack
B. Logic Bomb
C. Race Condition
D. SaaS - ANSWERSRace Condition
What causes resource exhaustion? *
3 points
A. DDoS
B. Ping Flood
C. Smurf Attack
D. Fraggle Attack
E. All of the Above - ANSWERSAll of the Above
The chance of harm coming to an asset *
3 points
, A. Vulnerability
B. Threat
C. Risk
D. Mitigation - ANSWERSRisk
What is an example of a technical control? *
3 points
A. Management
B. Firewall
C. Locks
D. SOP - ANSWERSFirewall
What is an example of a physical control? *
3 points
A. Management
B. Firewall
C. Locks
D. SOP - ANSWERSLocks
What is used as a detective deterrence? *
3 points
A. Firewall
B. Locks
C. SOP
D. CCTV - ANSWERSCCTV
What is least privilege? *
3 points
A. Security control that mitigates the accidental unauthorized disclosure of data
B. Given to an individual because of where they work or the group they belong to
C. Choice between cell-level encryption or FDE
D. A removal card or external device - ANSWERSGiven to an individual because of
where they work or the group they belong to
What are the 3 things associated with a digital signature? *
3 points
A. Authentication
B. Integrity
C. Non-Repudiation
D. S/MIME - ANSWERSAuthentication
Integrity
Non-Repudiation
What is involved with patch management? *
3 points
A. Perform system hardening