Question: Please answer them ALL for me to understand 1. Which of the following advanced search keywords do attackers take advantage of in order to see
Please answer them ALL for me to understand
1. Which of the following advanced search keywords do attackers take advantage of in order to see web page content without actually connecting to the target web server?
Choice a
Link:
Choice b
Intitle:
Choice c
Allinurl:
Choice d
Cache:
2. What is the best approach for comparing the configuration of a host operating system against a recommended secure configuration?
Choice a
Test the operating system for correct, secure operation
Choice b
Ensure that all changes to the configuration have been approved and implemented
Choice c
Verify that the recommended configuration rules are present on the host configuration
Choice d
Validate that the host configuration is aligned with the recommended configuration
3. Kendra is worried about the difference between a security procedure and a baseline. What is the correct definition of each term?
Choice a
A baseline outlines the configuration of a device and a procedure lists the steps and actions that must be followed
Choice b
A baseline outlines the steps to accomplish a task, a procedure is the correct configuration
Choice c
A baseline is a set of recommended actions, a procedure is a list of required actions
Choice d
A baseline defines the mission and objectives of a security program, a procedure lists the hardware and software to be used in the organization
4.Which of the following would be most effective against blocking a recently discovered vulnerability in the HTTP Service on your web server that results in remote code execution? (Choose one)
Choice a
HIPS
Choice b
NIDS
Choice c
NIPS
Choice d
Firewall
5. You are assigned your first Penetration test and have been given only the URL of the target organization to work with. What type of testing is this?
Choice a
You are gray box testing.
Choice b
You are white box testing.
Choice c
You are blind box testing.
Choice d
You are black box testing.
6. Which of the following is the best method to counteract offline password cracking? Choose the best answer.
Choice a
Setting a password policy with a maximum age of 30 days
Choice b
Setting a password policy with a minimum age of 30 days
Choice c
Use of one time passwords
Choice d
Setting a password policy with a minimum length of 6 characters
7. When deploying patches in large environments, which of the following can increase time efficiency?
Choice a
A thorough patch testing environment with direct interconnectivity to the production environment
Choice b
A written procedure for removing old outdated patches
Choice c
A centralized patch management application
Choice d
An application layer firewall with roll back capability
8. The process of flooding a local segment with thousands of random MAC addresses can result in some switches behaving like a hub. The goal of the hacker is to accomplish what?
Choice a
SYN flood
Choice b
Sniffing in a switched network
Choice c
ARP cache poisoning
Choice d
Denial of service
9. Security is the responsibility of
Choice a
The CISSO and Security Officer
Choice b
Senior Management
Choice c
Everyone
Choice d
Users
10. Which of the following best describes "a threat"?
Choice a
A vulnerability that exists without an available patch
Choice b
Weakness within an application or system
Choice c
Activity that represents possible danger to information or operations
Choice d
Specific instance of attack
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
