logo

Crowdly

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Which of the following is a passive footprinting method? (Choose all that apply.)
33%
0%
67%
0%
View this question
Which of the following are common registry locations for malware insertion?
0%
0%
0%
100%
0%
View this question
What element of data categorization management can override all other forms of access control?
0%
67%
0%
33%
View this question
A Buffer Overflow attack involves:
100%
0%
0%
0%
View this question
Which of the following nmap scans would be the least detectable?
0%
0%
100%
0%
View this question
You  have  discovered  that  an  employee  has  attached  a  modem  to  his  telephone  line  and workstation. He has used this modem to dial in to his workstation, thereby bypassing your Firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. What can you do to solve this problem?
100%
0%
0%
0%
View this question
What flag or flags are sent in the segment during the second step of the TCp three-way handshake?
0%
100%
0%
0%
View this question
What is the disadvantage of an automated vulnerability assessment tool?
100%
0%
0%
0%
0%
View this question
You are examining the output of a recent SYN scan. You see a port from one machine has returned an RST/ACK. What is the state of the port?
100%
0%
0%
0%
View this question
What are the two common data classification schemes?
0%
0%
0%
100%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!