Question: Please answer them ALL for me to understand 1. Which of the following advanced search keywords do attackers take advantage of in order to see

Please answer them ALL for me to understand

1. Which of the following advanced search keywords do attackers take advantage of in order to see web page content without actually connecting to the target web server?

Choice a

Link:

Choice b

Intitle:

Choice c

Allinurl:

Choice d

Cache:

2. What is the best approach for comparing the configuration of a host operating system against a recommended secure configuration?

Choice a

Test the operating system for correct, secure operation

Choice b

Ensure that all changes to the configuration have been approved and implemented

Choice c

Verify that the recommended configuration rules are present on the host configuration

Choice d

Validate that the host configuration is aligned with the recommended configuration

3. Kendra is worried about the difference between a security procedure and a baseline. What is the correct definition of each term?

Choice a

A baseline outlines the configuration of a device and a procedure lists the steps and actions that must be followed

Choice b

A baseline outlines the steps to accomplish a task, a procedure is the correct configuration

Choice c

A baseline is a set of recommended actions, a procedure is a list of required actions

Choice d

A baseline defines the mission and objectives of a security program, a procedure lists the hardware and software to be used in the organization

4.Which of the following would be most effective against blocking a recently discovered vulnerability in the HTTP Service on your web server that results in remote code execution? (Choose one)

Choice a

HIPS

Choice b

NIDS

Choice c

NIPS

Choice d

Firewall

5. You are assigned your first Penetration test and have been given only the URL of the target organization to work with. What type of testing is this?

Choice a

You are gray box testing.

Choice b

You are white box testing.

Choice c

You are blind box testing.

Choice d

You are black box testing.

6. Which of the following is the best method to counteract offline password cracking? Choose the best answer.

Choice a

Setting a password policy with a maximum age of 30 days

Choice b

Setting a password policy with a minimum age of 30 days

Choice c

Use of one time passwords

Choice d

Setting a password policy with a minimum length of 6 characters

7. When deploying patches in large environments, which of the following can increase time efficiency?

Choice a

A thorough patch testing environment with direct interconnectivity to the production environment

Choice b

A written procedure for removing old outdated patches

Choice c

A centralized patch management application

Choice d

An application layer firewall with roll back capability

8. The process of flooding a local segment with thousands of random MAC addresses can result in some switches behaving like a hub. The goal of the hacker is to accomplish what?

Choice a

SYN flood

Choice b

Sniffing in a switched network

Choice c

ARP cache poisoning

Choice d

Denial of service

9. Security is the responsibility of

Choice a

The CISSO and Security Officer

Choice b

Senior Management

Choice c

Everyone

Choice d

Users

10. Which of the following best describes "a threat"?

Choice a

A vulnerability that exists without an available patch

Choice b

Weakness within an application or system

Choice c

Activity that represents possible danger to information or operations

Choice d

Specific instance of attack

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!