logo

Crowdly

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

You're running an IDLE scan and send the first packet to the target machine. Next, the SYN/ACK packet is sent to the zombie. The IPID on the return packet from the zombie is 36754. If the starting IPID was 36753, in what state is the port on the target machine?
0%
0%
0%
100%
View this question
Data classifications are used to focus security controls over all but which of the following?
100%
0%
0%
0%
View this question
Your company has a document that spells out exactly what employees  are allowed  to do on their computer systems. It also defines what is prohibited and what consequences await those who break the rules. A copy of this document is signed by all employees  prior to their network  access. Which of the following best describes this Policy?
0%
0%
100%
0%
View this question
An Ethical Hacker finds a web application offering an error message with an entry area for an e-mail account. He enters the following into the field and presses ENTER: ‘ or ‘1’=‘1 A message appears stating “Your login information has been mailed to andy.adams@yahoo.com.” What is the most likely reason for this?
0%
100%
0%
0%
View this question
Which of the following would  be considered a passive online  password  attack?
100%
0%
0%
0%
View this question
An organization wants to save on time and money and decides to go with an automated approach to pentesting. Which of the following tools would work for this? (Choose all that apply.)
0%
0%
100%
0%
View this question
Which of the following is the best choice for providing secure remote access, minimizing MITM opportunities?
0%
33%
0%
0%
67%
View this question
Which of the following best describes an API that allows application components to communicate with other components?
0%
0%
50%
50%
View this question
_______________ refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.
0%
0%
0%
100%
View this question
Which of the following best describes session key creation in SSL?
67%
0%
33%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!