Questions & Answers 100% Solved!!
What is the difference between credentialed and non credentialed scanning? * -
ANSWERSCredentialed vulnerability scan you have the credentials to access the
systems in your environment.
Non-credentialed scans can only observe responses from the outside.
Why do we use a WAF? - ANSWERSProtects the web server from malicious web traffic
What are the Bluetooth attacks? Pick all that apply
A. Bluejacking
B. Blue-snarfing
C. Bluebugging
D. Blueknifing - ANSWERSA B C
Which Bluetooth attack is sending of unsolicited messages over Bluetooth? *
A. Bluejacking
B. Blue-snarfing
C. Bluebugging
D. Blueknifing - ANSWERSA
An attacker makes processes execute out of sequence to control the result in a way that
accomplishes the attackers goals. *
A. Pre-emptive attack
B. Logic Bomb
C. Race Condition
D. SaaS - ANSWERSC
What causes resource exhaustion? *
3 points
A. DDoS
B. Ping Flood
C. Smurf Attack
D. Fraggle Attack
E. All of the Above - ANSWERSE
The chance of harm coming to an asset *
3 points
A. Vulnerability
, B. Threat
C. Risk
D. Mitigation - ANSWERSC
What is an example of a technical control? *
3 points
A. Management
B. Firewall
C. Locks
D. SOP - ANSWERSB
What is an example of a physical control? *
3 points
A. Management
B. Firewall
C. Locks
D. SOP - ANSWERSC
What is used as a detective deterrence? *
3 points
A. Firewall
B. Locks
C. SOP
D. CCTV - ANSWERSD
Another name for hashing is? *
3 points
A. Authentication
B. Authority
C. Integrity
D. Public Key Cryptography - ANSWERSC
What are the 3 things associated with a digital signature? *
3 points
A. Authentication
B. Integrity
C. Non-Repudiation
D. S/MIME - ANSWERSA B C What is least privilege? *
3 points
A. Security control that mitigates the accidental unauthorized disclosure of data
B. Given to an individual because of where they work or the group they belong to
C. Choice between cell-level encryption or FDE
D. A removal card or external device - ANSWERSB
What is Steganography? *
3 points