logo

Crowdly

Browser

Add to Chrome

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Which flag forces a termination of communications in both directions?
88%
13%
0%
0%
View this question
What does the Google hack “intitle:login” attempt to accomplish?
86%
0%
14%
0%
View this question
Which of the following best matches the purpose of key escrow? (depot de clées)
0%
100%
0%
0%
View this question
Which of the following is the lowest military data classification for classified data?
29%
43%
0%
29%
View this question
While footprinting a network, what port/service should you look for to attempt a zone transfer?
0%
0%
0%
0%
0%
0%
0%
View this question
While pen testing a client, you discover that LM hashing, with no salting, is still engaged for backward  compatibility on most systems. One stolen password hash reads 9FAF6B755DC38E12AAD3B435B51404EE. Is this user following good password  procedures?
0%
0%
0%
0%
View this question
When discussing passwords, what is considered a brute force attack?
0%
0%
100%
0%
View this question
You are reviewing a packet capture in Wireshark but only need to see packets from IP address 198.16.150.170. Which of the following filters will provide the output you want to see?
0%
0%
0%
0%
View this question
A security peer is confused about a recent incident. An attacker successfully accessed a machine in the organization and made off with some sensitive data. A full vulnerability scan was run immediately following the theft, and nothing was discovered. Which of the following best describes what may have happened?
0%
100%
0%
0%
View this question
Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects?
100%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome