logo

Crowdly

Browser

Add to Chrome

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

You  have  discovered  that  an  employee  has  attached  a  modem  to  his  telephone  line  and workstation. He has used this modem to dial in to his workstation, thereby bypassing your Firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. What can you do to solve this problem?
0%
100%
0%
0%
View this question
What flag or flags are sent in the segment during the second step of the TCp three-way handshake?
100%
0%
0%
0%
View this question
What is the disadvantage of an automated vulnerability assessment tool?
43%
0%
0%
57%
0%
View this question
You are examining the output of a recent SYN scan. You see a port from one machine has returned an RST/ACK. What is the state of the port?
0%
0%
0%
0%
View this question
What are the two common data classification schemes?
86%
0%
14%
0%
View this question
Which of the following is not true?
0%
0%
0%
0%
View this question
In categorizing risk, which of the following refers to choosing not to use a technology or service due to the risk?
100%
0%
0%
0%
View this question
Sally is a member of a pen test team newly hired to test a bank's security. She begins searching for IP addresses the bank may own by searching public records on the Internet. She also looks up news articles and job postings to discover information that may be valuable. What phase of the pen test is Sally working?
0%
0%
0%
0%
View this question
Which command would display all connections and listening ports in numerical form?
0%
86%
0%
0%
14%
View this question
You are searching for systems with file sharing enabled. Which port would be seen in a listening state on a Microsoft Windows machine, thus indicating file sharing?
100%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome