{"id":15725,"date":"2020-12-12T03:40:45","date_gmt":"2020-12-12T03:40:45","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=15725"},"modified":"2020-12-12T03:40:50","modified_gmt":"2020-12-12T03:40:50","slug":"certified-professional-ethical-hacker-cpeh-cpeh-001-dumps","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/certified-professional-ethical-hacker-cpeh-cpeh-001-dumps.html","title":{"rendered":"Certified Professional Ethical Hacker (CPEH) CPEH-001 Dumps"},"content":{"rendered":"\n<p>Do you want to be a Certified Professional Ethical Hacker (CPEH) certified? A Certified Professional Ethical Hacker is a professional who uses the same knowledge and tools as a malicious hacker, understands and knows how to look for the weaknesses and vulnerabilities in target systems and fortify them. New CPEH-001 dumps have been released with 736 practice exam questions and answers, you are highly recommended to read CPEH-001 dumps in pdf file for good preparation.<\/p>\n<h2>Certified Professional Ethical Hacker (CPEH) <span style=\"color: #3366ff;\">CPEH-001 Free Dumps<\/span><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam4681\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-4681\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-4681\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-149124'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. <br \/>\r<br>What is the name of the command used by SMTP to transmit email over TLS?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='149124' \/><input type='hidden' id='answerType149124' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149124[]' id='answer-id-606965' class='answer   answerof-149124 ' value='606965'   \/><label for='answer-id-606965' id='answer-label-606965' class=' answer'><span>OPPORTUNISTICTLS STARTTLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149124[]' id='answer-id-606966' class='answer   answerof-149124 ' value='606966'   \/><label for='answer-id-606966' id='answer-label-606966' class=' answer'><span>FORCETLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149124[]' id='answer-id-606967' class='answer   answerof-149124 ' value='606967'   \/><label for='answer-id-606967' id='answer-label-606967' class=' answer'><span>UPGRADETLS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-149125'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Developers at your company are creating a web application which will be available for use by anyone on the Internet, the developers have taken the approach of implementing a Three-Tier Architecture for the web application. <br \/>\r<br>The developers are now asking you which network should the Presentation Tier (front- end web server) be placed in?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='149125' \/><input type='hidden' id='answerType149125' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149125[]' id='answer-id-606968' class='answer   answerof-149125 ' value='606968'   \/><label for='answer-id-606968' id='answer-label-606968' class=' answer'><span>isolated vlan network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149125[]' id='answer-id-606969' class='answer   answerof-149125 ' value='606969'   \/><label for='answer-id-606969' id='answer-label-606969' class=' answer'><span>Mesh network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149125[]' id='answer-id-606970' class='answer   answerof-149125 ' value='606970'   \/><label for='answer-id-606970' id='answer-label-606970' class=' answer'><span>DMZ network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149125[]' id='answer-id-606971' class='answer   answerof-149125 ' value='606971'   \/><label for='answer-id-606971' id='answer-label-606971' class=' answer'><span>Internal network<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-149126'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Your business has decided to add credit card numbers to the data it backs up to tape. <br \/>\r<br>Which of the following represents the best practice your business should observe?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='149126' \/><input type='hidden' id='answerType149126' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149126[]' id='answer-id-606972' class='answer   answerof-149126 ' value='606972'   \/><label for='answer-id-606972' id='answer-label-606972' class=' answer'><span>Hire a security consultant to provide direction.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149126[]' id='answer-id-606973' class='answer   answerof-149126 ' value='606973'   \/><label for='answer-id-606973' id='answer-label-606973' class=' answer'><span>Do not back up cither the credit card numbers or then hashes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149126[]' id='answer-id-606974' class='answer   answerof-149126 ' value='606974'   \/><label for='answer-id-606974' id='answer-label-606974' class=' answer'><span>Back up the hashes of the credit card numbers not the actual credit card numbers.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149126[]' id='answer-id-606975' class='answer   answerof-149126 ' value='606975'   \/><label for='answer-id-606975' id='answer-label-606975' class=' answer'><span>Encrypt backup tapes that are sent off-site.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-149127'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>What is the main security service a cryptographic hash provides?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='149127' \/><input type='hidden' id='answerType149127' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149127[]' id='answer-id-606976' class='answer   answerof-149127 ' value='606976'   \/><label for='answer-id-606976' id='answer-label-606976' class=' answer'><span>Integrity and ease of computation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149127[]' id='answer-id-606977' class='answer   answerof-149127 ' value='606977'   \/><label for='answer-id-606977' id='answer-label-606977' class=' answer'><span>Message authentication and collision resistance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149127[]' id='answer-id-606978' class='answer   answerof-149127 ' value='606978'   \/><label for='answer-id-606978' id='answer-label-606978' class=' answer'><span>Integrity and collision resistance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149127[]' id='answer-id-606979' class='answer   answerof-149127 ' value='606979'   \/><label for='answer-id-606979' id='answer-label-606979' class=' answer'><span>Integrity and computational in-feasibility<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-149128'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='149128' \/><input type='hidden' id='answerType149128' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149128[]' id='answer-id-606980' class='answer   answerof-149128 ' value='606980'   \/><label for='answer-id-606980' id='answer-label-606980' class=' answer'><span>Libpcap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149128[]' id='answer-id-606981' class='answer   answerof-149128 ' value='606981'   \/><label for='answer-id-606981' id='answer-label-606981' class=' answer'><span>Awinpcap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149128[]' id='answer-id-606982' class='answer   answerof-149128 ' value='606982'   \/><label for='answer-id-606982' id='answer-label-606982' class=' answer'><span>Winprom<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149128[]' id='answer-id-606983' class='answer   answerof-149128 ' value='606983'   \/><label for='answer-id-606983' id='answer-label-606983' class=' answer'><span>Winpcap<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-149129'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>What is one of the advantages of using both symmetric and asymmetric cryptography in SSL\/TLS?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='149129' \/><input type='hidden' id='answerType149129' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149129[]' id='answer-id-606984' class='answer   answerof-149129 ' value='606984'   \/><label for='answer-id-606984' id='answer-label-606984' class=' answer'><span>Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149129[]' id='answer-id-606985' class='answer   answerof-149129 ' value='606985'   \/><label for='answer-id-606985' id='answer-label-606985' class=' answer'><span>Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149129[]' id='answer-id-606986' class='answer   answerof-149129 ' value='606986'   \/><label for='answer-id-606986' id='answer-label-606986' class=' answer'><span>Symmetric encryption allows the server to securely transmit the session keys out-of-band.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149129[]' id='answer-id-606987' class='answer   answerof-149129 ' value='606987'   \/><label for='answer-id-606987' id='answer-label-606987' class=' answer'><span>Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-149130'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='149130' \/><input type='hidden' id='answerType149130' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149130[]' id='answer-id-606988' class='answer   answerof-149130 ' value='606988'   \/><label for='answer-id-606988' id='answer-label-606988' class=' answer'><span>Data items and vulnerability scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149130[]' id='answer-id-606989' class='answer   answerof-149130 ' value='606989'   \/><label for='answer-id-606989' id='answer-label-606989' class=' answer'><span>Interviewing employees and network engineers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149130[]' id='answer-id-606990' class='answer   answerof-149130 ' value='606990'   \/><label for='answer-id-606990' id='answer-label-606990' class=' answer'><span>Reviewing the firewalls configuration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149130[]' id='answer-id-606991' class='answer   answerof-149130 ' value='606991'   \/><label for='answer-id-606991' id='answer-label-606991' class=' answer'><span>Source code review<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-149131'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Why containers are less secure that virtual machines?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='149131' \/><input type='hidden' id='answerType149131' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149131[]' id='answer-id-606992' class='answer   answerof-149131 ' value='606992'   \/><label for='answer-id-606992' id='answer-label-606992' class=' answer'><span>Host OS on containers has a larger surface attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149131[]' id='answer-id-606993' class='answer   answerof-149131 ' value='606993'   \/><label for='answer-id-606993' id='answer-label-606993' class=' answer'><span>Containers may full fill disk space of the host.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149131[]' id='answer-id-606994' class='answer   answerof-149131 ' value='606994'   \/><label for='answer-id-606994' id='answer-label-606994' class=' answer'><span>A compromise container may cause a CPU starvation of the host.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149131[]' id='answer-id-606995' class='answer   answerof-149131 ' value='606995'   \/><label for='answer-id-606995' id='answer-label-606995' class=' answer'><span>Containers are attached to the same virtual network.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-149132'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>These hackers have limited or no training and know how to use only basic techniques or tools. <br \/>\r<br>What kind of hackers are we talking about?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='149132' \/><input type='hidden' id='answerType149132' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149132[]' id='answer-id-606996' class='answer   answerof-149132 ' value='606996'   \/><label for='answer-id-606996' id='answer-label-606996' class=' answer'><span>Black-Hat Hackers A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149132[]' id='answer-id-606997' class='answer   answerof-149132 ' value='606997'   \/><label for='answer-id-606997' id='answer-label-606997' class=' answer'><span>Script Kiddies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149132[]' id='answer-id-606998' class='answer   answerof-149132 ' value='606998'   \/><label for='answer-id-606998' id='answer-label-606998' class=' answer'><span>White-Hat Hackers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149132[]' id='answer-id-606999' class='answer   answerof-149132 ' value='606999'   \/><label for='answer-id-606999' id='answer-label-606999' class=' answer'><span>Gray-Hat Hacker<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-149133'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had ever sent a mail. <br \/>\r<br>What do you want to &quot;&quot;know&quot;&quot; to prove yourself that it was Bob who had send a mail?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='149133' \/><input type='hidden' id='answerType149133' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149133[]' id='answer-id-607000' class='answer   answerof-149133 ' value='607000'   \/><label for='answer-id-607000' id='answer-label-607000' class=' answer'><span>Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149133[]' id='answer-id-607001' class='answer   answerof-149133 ' value='607001'   \/><label for='answer-id-607001' id='answer-label-607001' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149133[]' id='answer-id-607002' class='answer   answerof-149133 ' value='607002'   \/><label for='answer-id-607002' id='answer-label-607002' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149133[]' id='answer-id-607003' class='answer   answerof-149133 ' value='607003'   \/><label for='answer-id-607003' id='answer-label-607003' class=' answer'><span>Non-Repudiation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-149134'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>In the field of cryptanalysis, what is meant by a \u201crubber-hose&quot; attack?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='149134' \/><input type='hidden' id='answerType149134' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149134[]' id='answer-id-607004' class='answer   answerof-149134 ' value='607004'   \/><label for='answer-id-607004' id='answer-label-607004' class=' answer'><span>Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149134[]' id='answer-id-607005' class='answer   answerof-149134 ' value='607005'   \/><label for='answer-id-607005' id='answer-label-607005' class=' answer'><span>Extraction of cryptographic secrets through coercion or torture.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149134[]' id='answer-id-607006' class='answer   answerof-149134 ' value='607006'   \/><label for='answer-id-607006' id='answer-label-607006' class=' answer'><span>Forcing the targeted key stream through a hardware-accelerated device such as an ASI<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149134[]' id='answer-id-607007' class='answer   answerof-149134 ' value='607007'   \/><label for='answer-id-607007' id='answer-label-607007' class=' answer'><span>A backdoor placed into a cryptographic algorithm by its creator.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-149135'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='149135' \/><input type='hidden' id='answerType149135' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149135[]' id='answer-id-607008' class='answer   answerof-149135 ' value='607008'   \/><label for='answer-id-607008' id='answer-label-607008' class=' answer'><span>Black-box<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149135[]' id='answer-id-607009' class='answer   answerof-149135 ' value='607009'   \/><label for='answer-id-607009' id='answer-label-607009' class=' answer'><span>Announced<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149135[]' id='answer-id-607010' class='answer   answerof-149135 ' value='607010'   \/><label for='answer-id-607010' id='answer-label-607010' class=' answer'><span>White-box<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149135[]' id='answer-id-607011' class='answer   answerof-149135 ' value='607011'   \/><label for='answer-id-607011' id='answer-label-607011' class=' answer'><span>Grey-box<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-149136'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which of the following steps for risk assessment methodology refers to vulnerability identification?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='149136' \/><input type='hidden' id='answerType149136' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149136[]' id='answer-id-607012' class='answer   answerof-149136 ' value='607012'   \/><label for='answer-id-607012' id='answer-label-607012' class=' answer'><span>Determines if any flaws exist in systems, policies, or procedures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149136[]' id='answer-id-607013' class='answer   answerof-149136 ' value='607013'   \/><label for='answer-id-607013' id='answer-label-607013' class=' answer'><span>Assigns values to risk probabilities; Impact values.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149136[]' id='answer-id-607014' class='answer   answerof-149136 ' value='607014'   \/><label for='answer-id-607014' id='answer-label-607014' class=' answer'><span>Determines risk probability that vulnerability will be exploited (High. Medium, Low)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149136[]' id='answer-id-607015' class='answer   answerof-149136 ' value='607015'   \/><label for='answer-id-607015' id='answer-label-607015' class=' answer'><span>Identifies sources of harm to an IT system. (Natural, Human. Environmental)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-149137'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours. <br \/>\r<br>What protocol used on Linux servers to synchronize the time has stopped working?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='149137' \/><input type='hidden' id='answerType149137' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149137[]' id='answer-id-607016' class='answer   answerof-149137 ' value='607016'   \/><label for='answer-id-607016' id='answer-label-607016' class=' answer'><span>Time Keeper<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149137[]' id='answer-id-607017' class='answer   answerof-149137 ' value='607017'   \/><label for='answer-id-607017' id='answer-label-607017' class=' answer'><span>NTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149137[]' id='answer-id-607018' class='answer   answerof-149137 ' value='607018'   \/><label for='answer-id-607018' id='answer-label-607018' class=' answer'><span>PPP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149137[]' id='answer-id-607019' class='answer   answerof-149137 ' value='607019'   \/><label for='answer-id-607019' id='answer-label-607019' class=' answer'><span>OSPP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-149138'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>What is the minimum number of network connections in a multi homed firewall?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='149138' \/><input type='hidden' id='answerType149138' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149138[]' id='answer-id-607020' class='answer   answerof-149138 ' value='607020'   \/><label for='answer-id-607020' id='answer-label-607020' class=' answer'><span>3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149138[]' id='answer-id-607021' class='answer   answerof-149138 ' value='607021'   \/><label for='answer-id-607021' id='answer-label-607021' class=' answer'><span>5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149138[]' id='answer-id-607022' class='answer   answerof-149138 ' value='607022'   \/><label for='answer-id-607022' id='answer-label-607022' class=' answer'><span>4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149138[]' id='answer-id-607023' class='answer   answerof-149138 ' value='607023'   \/><label for='answer-id-607023' id='answer-label-607023' class=' answer'><span>2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-149139'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? <br \/>\r<br>The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.<\/div><input type='hidden' name='question_id[]' id='qID_16' value='149139' \/><input type='hidden' id='answerType149139' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149139[]' id='answer-id-607024' class='answer   answerof-149139 ' value='607024'   \/><label for='answer-id-607024' id='answer-label-607024' class=' answer'><span>My Doom<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149139[]' id='answer-id-607025' class='answer   answerof-149139 ' value='607025'   \/><label for='answer-id-607025' id='answer-label-607025' class=' answer'><span>Astacheldraht<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149139[]' id='answer-id-607026' class='answer   answerof-149139 ' value='607026'   \/><label for='answer-id-607026' id='answer-label-607026' class=' answer'><span>R-U-Dead-Yet? (RUDY)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149139[]' id='answer-id-607027' class='answer   answerof-149139 ' value='607027'   \/><label for='answer-id-607027' id='answer-label-607027' class=' answer'><span>LOIC<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-149140'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>During the process of encryption and decryption, what keys are shared?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='149140' \/><input type='hidden' id='answerType149140' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149140[]' id='answer-id-607028' class='answer   answerof-149140 ' value='607028'   \/><label for='answer-id-607028' id='answer-label-607028' class=' answer'><span>Private keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149140[]' id='answer-id-607029' class='answer   answerof-149140 ' value='607029'   \/><label for='answer-id-607029' id='answer-label-607029' class=' answer'><span>User passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149140[]' id='answer-id-607030' class='answer   answerof-149140 ' value='607030'   \/><label for='answer-id-607030' id='answer-label-607030' class=' answer'><span>Public keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149140[]' id='answer-id-607031' class='answer   answerof-149140 ' value='607031'   \/><label for='answer-id-607031' id='answer-label-607031' class=' answer'><span>Public and private keys<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-149141'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='149141' \/><input type='hidden' id='answerType149141' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149141[]' id='answer-id-607032' class='answer   answerof-149141 ' value='607032'   \/><label for='answer-id-607032' id='answer-label-607032' class=' answer'><span>Nmap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149141[]' id='answer-id-607033' class='answer   answerof-149141 ' value='607033'   \/><label for='answer-id-607033' id='answer-label-607033' class=' answer'><span>Cain &amp; Abel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149141[]' id='answer-id-607034' class='answer   answerof-149141 ' value='607034'   \/><label for='answer-id-607034' id='answer-label-607034' class=' answer'><span>Nessus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149141[]' id='answer-id-607035' class='answer   answerof-149141 ' value='607035'   \/><label for='answer-id-607035' id='answer-label-607035' class=' answer'><span>Snort<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-149142'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender\u2019s identity?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='149142' \/><input type='hidden' id='answerType149142' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149142[]' id='answer-id-607036' class='answer   answerof-149142 ' value='607036'   \/><label for='answer-id-607036' id='answer-label-607036' class=' answer'><span>Hash value<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149142[]' id='answer-id-607037' class='answer   answerof-149142 ' value='607037'   \/><label for='answer-id-607037' id='answer-label-607037' class=' answer'><span>Private key<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149142[]' id='answer-id-607038' class='answer   answerof-149142 ' value='607038'   \/><label for='answer-id-607038' id='answer-label-607038' class=' answer'><span>Digital signature<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149142[]' id='answer-id-607039' class='answer   answerof-149142 ' value='607039'   \/><label for='answer-id-607039' id='answer-label-607039' class=' answer'><span>Digital certificate<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-149143'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. <br \/>\r<br>What would be a good step to have in the procedures for a situation like this?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='149143' \/><input type='hidden' id='answerType149143' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149143[]' id='answer-id-607040' class='answer   answerof-149143 ' value='607040'   \/><label for='answer-id-607040' id='answer-label-607040' class=' answer'><span>Have the network team document the reason why the rule was implemented without prior manager approval.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149143[]' id='answer-id-607041' class='answer   answerof-149143 ' value='607041'   \/><label for='answer-id-607041' id='answer-label-607041' class=' answer'><span>Monitor all traffic using the firewall rule until a manager can approve it.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149143[]' id='answer-id-607042' class='answer   answerof-149143 ' value='607042'   \/><label for='answer-id-607042' id='answer-label-607042' class=' answer'><span>Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149143[]' id='answer-id-607043' class='answer   answerof-149143 ' value='607043'   \/><label for='answer-id-607043' id='answer-label-607043' class=' answer'><span>Immediately roll back the firewall rule until a manager can approve it<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-149144'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. <br \/>\r<br>Which of the following requirements would best fit under the objective, &quot;Implement strong access control measures&quot;?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='149144' \/><input type='hidden' id='answerType149144' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149144[]' id='answer-id-607044' class='answer   answerof-149144 ' value='607044'   \/><label for='answer-id-607044' id='answer-label-607044' class=' answer'><span>Regularly test security systems and processes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149144[]' id='answer-id-607045' class='answer   answerof-149144 ' value='607045'   \/><label for='answer-id-607045' id='answer-label-607045' class=' answer'><span>Encrypt transmission of cardholder data across open, public networks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149144[]' id='answer-id-607046' class='answer   answerof-149144 ' value='607046'   \/><label for='answer-id-607046' id='answer-label-607046' class=' answer'><span>Assign a unique ID to each person with computer access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149144[]' id='answer-id-607047' class='answer   answerof-149144 ' value='607047'   \/><label for='answer-id-607047' id='answer-label-607047' class=' answer'><span>Use and regularly update anti-virus software on all systems commonly affected by malware.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-149145'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address. <br \/>\r<br>What is the first thing that Nedved needs to do before contacting the incident response team?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='149145' \/><input type='hidden' id='answerType149145' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149145[]' id='answer-id-607048' class='answer   answerof-149145 ' value='607048'   \/><label for='answer-id-607048' id='answer-label-607048' class=' answer'><span>Leave it as it Is and contact the incident response te3m right away<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149145[]' id='answer-id-607049' class='answer   answerof-149145 ' value='607049'   \/><label for='answer-id-607049' id='answer-label-607049' class=' answer'><span>Block the connection to the suspicious IP Address from the firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149145[]' id='answer-id-607050' class='answer   answerof-149145 ' value='607050'   \/><label for='answer-id-607050' id='answer-label-607050' class=' answer'><span>Disconnect the email server from the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149145[]' id='answer-id-607051' class='answer   answerof-149145 ' value='607051'   \/><label for='answer-id-607051' id='answer-label-607051' class=' answer'><span>Migrate the connection to the backup email server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-149146'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his\/her password on a post it note and stick it to his\/her desk, leaving the computer unlocked, didn\u2019t log out from emails or other social media accounts, and etc. <br \/>\r<br>After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons. <br \/>\r<br>Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='149146' \/><input type='hidden' id='answerType149146' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149146[]' id='answer-id-607052' class='answer   answerof-149146 ' value='607052'   \/><label for='answer-id-607052' id='answer-label-607052' class=' answer'><span>Warning to those who write password on a post it note and put it on his\/her desk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149146[]' id='answer-id-607053' class='answer   answerof-149146 ' value='607053'   \/><label for='answer-id-607053' id='answer-label-607053' class=' answer'><span>Developing a strict information security policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149146[]' id='answer-id-607054' class='answer   answerof-149146 ' value='607054'   \/><label for='answer-id-607054' id='answer-label-607054' class=' answer'><span>Information security awareness training<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149146[]' id='answer-id-607055' class='answer   answerof-149146 ' value='607055'   \/><label for='answer-id-607055' id='answer-label-607055' class=' answer'><span>Conducting a one to one discussion with the other employees about the importance of information security<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-149147'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. <br \/>\r<br>Using Wire shark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='149147' \/><input type='hidden' id='answerType149147' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149147[]' id='answer-id-607056' class='answer   answerof-149147 ' value='607056'   \/><label for='answer-id-607056' id='answer-label-607056' class=' answer'><span>tcp.port != 21<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149147[]' id='answer-id-607057' class='answer   answerof-149147 ' value='607057'   \/><label for='answer-id-607057' id='answer-label-607057' class=' answer'><span>tcp.port = 23<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149147[]' id='answer-id-607058' class='answer   answerof-149147 ' value='607058'   \/><label for='answer-id-607058' id='answer-label-607058' class=' answer'><span>tcp.port ==21<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149147[]' id='answer-id-607059' class='answer   answerof-149147 ' value='607059'   \/><label for='answer-id-607059' id='answer-label-607059' class=' answer'><span>tcp.port ==21 || tcp.port ==22<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-149148'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>DHCP snooping is a great solution to prevent rogue DHCP servers on your network. <br \/>\r<br>Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='149148' \/><input type='hidden' id='answerType149148' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149148[]' id='answer-id-607060' class='answer   answerof-149148 ' value='607060'   \/><label for='answer-id-607060' id='answer-label-607060' class=' answer'><span>Port security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149148[]' id='answer-id-607061' class='answer   answerof-149148 ' value='607061'   \/><label for='answer-id-607061' id='answer-label-607061' class=' answer'><span>A Layer 2 Attack Prevention Protocol (LAPP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149148[]' id='answer-id-607062' class='answer   answerof-149148 ' value='607062'   \/><label for='answer-id-607062' id='answer-label-607062' class=' answer'><span>Dynamic ARP inspection (DAI)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149148[]' id='answer-id-607063' class='answer   answerof-149148 ' value='607063'   \/><label for='answer-id-607063' id='answer-label-607063' class=' answer'><span>Spanning tree<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-149149'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious Java scripts. After opening one of them, he noticed that it is very hard to understand the code and that all codes differ from the typical Java script. <br \/>\r<br>What is the name of this technique to hide the code and extend analysis time?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='149149' \/><input type='hidden' id='answerType149149' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149149[]' id='answer-id-607064' class='answer   answerof-149149 ' value='607064'   \/><label for='answer-id-607064' id='answer-label-607064' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149149[]' id='answer-id-607065' class='answer   answerof-149149 ' value='607065'   \/><label for='answer-id-607065' id='answer-label-607065' class=' answer'><span>Code encoding<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149149[]' id='answer-id-607066' class='answer   answerof-149149 ' value='607066'   \/><label for='answer-id-607066' id='answer-label-607066' class=' answer'><span>Obfuscation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149149[]' id='answer-id-607067' class='answer   answerof-149149 ' value='607067'   \/><label for='answer-id-607067' id='answer-label-607067' class=' answer'><span>Steganography<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-149150'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>What does the -oX flag do in an Nmap scan?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='149150' \/><input type='hidden' id='answerType149150' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149150[]' id='answer-id-607068' class='answer   answerof-149150 ' value='607068'   \/><label for='answer-id-607068' id='answer-label-607068' class=' answer'><span>Perform an express scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149150[]' id='answer-id-607069' class='answer   answerof-149150 ' value='607069'   \/><label for='answer-id-607069' id='answer-label-607069' class=' answer'><span>Output the results in truncated format to the screen<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149150[]' id='answer-id-607070' class='answer   answerof-149150 ' value='607070'   \/><label for='answer-id-607070' id='answer-label-607070' class=' answer'><span>Perform an Xmas scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149150[]' id='answer-id-607071' class='answer   answerof-149150 ' value='607071'   \/><label for='answer-id-607071' id='answer-label-607071' class=' answer'><span>Output the results in XML format to a file<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-149151'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Company XYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of Company XYZ. The employee of Company XYZ is aware of your test. <br \/>\r<br>Your email message looks like this: <br \/>\r<br>From: jim_miller@companyxyz.com <br \/>\r<br>To: michelle_saunders@companyxyz.com <br \/>\r<br>Subject: Test message <br \/>\r<br>Date: 4\/3\/2017 14:37 <br \/>\r<br>The employee of Company XYZ receives your email message. <br \/>\r<br>This proves that Company XYZ's email gateway doesn't prevent what?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='149151' \/><input type='hidden' id='answerType149151' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149151[]' id='answer-id-607072' class='answer   answerof-149151 ' value='607072'   \/><label for='answer-id-607072' id='answer-label-607072' class=' answer'><span>Email Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149151[]' id='answer-id-607073' class='answer   answerof-149151 ' value='607073'   \/><label for='answer-id-607073' id='answer-label-607073' class=' answer'><span>Email Masquerading<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149151[]' id='answer-id-607074' class='answer   answerof-149151 ' value='607074'   \/><label for='answer-id-607074' id='answer-label-607074' class=' answer'><span>Email Spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149151[]' id='answer-id-607075' class='answer   answerof-149151 ' value='607075'   \/><label for='answer-id-607075' id='answer-label-607075' class=' answer'><span>Email Harvesting<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-149152'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. <br \/>\r<br>Looking at the logs he copy and paste basic details like below: <br \/>\r<br>source IP: 192.168.21.100 <br \/>\r<br>source port: 80 <br \/>\r<br>destination IP: 192.168.10.23 <br \/>\r<br>destination port: 63221 <br \/>\r<br>What is the most proper answer?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='149152' \/><input type='hidden' id='answerType149152' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149152[]' id='answer-id-607076' class='answer   answerof-149152 ' value='607076'   \/><label for='answer-id-607076' id='answer-label-607076' class=' answer'><span>This is most probably true negative.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149152[]' id='answer-id-607077' class='answer   answerof-149152 ' value='607077'   \/><label for='answer-id-607077' id='answer-label-607077' class=' answer'><span>This is most probably true positive which triggered on secure communication between client and server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149152[]' id='answer-id-607078' class='answer   answerof-149152 ' value='607078'   \/><label for='answer-id-607078' id='answer-label-607078' class=' answer'><span>This is most probably false-positive, because an alert triggered on reversed traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149152[]' id='answer-id-607079' class='answer   answerof-149152 ' value='607079'   \/><label for='answer-id-607079' id='answer-label-607079' class=' answer'><span>This is most probably false-positive because IDS is monitoring one direction traffic.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-149153'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. <br \/>\r<br>He can mark this alert as:<\/div><input type='hidden' name='question_id[]' id='qID_30' value='149153' \/><input type='hidden' id='answerType149153' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149153[]' id='answer-id-607080' class='answer   answerof-149153 ' value='607080'   \/><label for='answer-id-607080' id='answer-label-607080' class=' answer'><span>False-Negative<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149153[]' id='answer-id-607081' class='answer   answerof-149153 ' value='607081'   \/><label for='answer-id-607081' id='answer-label-607081' class=' answer'><span>False-Positive<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149153[]' id='answer-id-607082' class='answer   answerof-149153 ' value='607082'   \/><label for='answer-id-607082' id='answer-label-607082' class=' answer'><span>True-Positive<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149153[]' id='answer-id-607083' class='answer   answerof-149153 ' value='607083'   \/><label for='answer-id-607083' id='answer-label-607083' class=' answer'><span>False-Signature<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-149154'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Trinity needs to scan all hosts on a \/16 network for TCP port 445 only. <br \/>\r<br>What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.<\/div><input type='hidden' name='question_id[]' id='qID_31' value='149154' \/><input type='hidden' id='answerType149154' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149154[]' id='answer-id-607084' class='answer   answerof-149154 ' value='607084'   \/><label for='answer-id-607084' id='answer-label-607084' class=' answer'><span>nmap -sn -sF 10.1.0.0\/16 445<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149154[]' id='answer-id-607085' class='answer   answerof-149154 ' value='607085'   \/><label for='answer-id-607085' id='answer-label-607085' class=' answer'><span>nmap -p 445 -n -T4 Copen 10.1.0.0\/16<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149154[]' id='answer-id-607086' class='answer   answerof-149154 ' value='607086'   \/><label for='answer-id-607086' id='answer-label-607086' class=' answer'><span>nmap -s 445 -sU -T5 10.1.0.0\/16<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149154[]' id='answer-id-607087' class='answer   answerof-149154 ' value='607087'   \/><label for='answer-id-607087' id='answer-label-607087' class=' answer'><span>nmap -p 445 Cmax -Pn 10.1.0.0\/16<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-149155'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0\/8 and 192.168.0.0\/8. <br \/>\r<br>While monitoring the data, you find a high number of outbound connections. You see that IP\u2019s owned by XYZ (Internal) and private IP\u2019s are communicating to a Single Public IP. Therefore, the Internal IP\u2019s are sending data to the Public IP. <br \/>\r<br>After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised. <br \/>\r<br>What kind of attack does the above scenario depict?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='149155' \/><input type='hidden' id='answerType149155' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149155[]' id='answer-id-607088' class='answer   answerof-149155 ' value='607088'   \/><label for='answer-id-607088' id='answer-label-607088' class=' answer'><span>Botnet Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149155[]' id='answer-id-607089' class='answer   answerof-149155 ' value='607089'   \/><label for='answer-id-607089' id='answer-label-607089' class=' answer'><span>Spear Phishing Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149155[]' id='answer-id-607090' class='answer   answerof-149155 ' value='607090'   \/><label for='answer-id-607090' id='answer-label-607090' class=' answer'><span>Advanced Persistent Threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149155[]' id='answer-id-607091' class='answer   answerof-149155 ' value='607091'   \/><label for='answer-id-607091' id='answer-label-607091' class=' answer'><span>Rootkit Attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-149156'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner\u2019s permission. Their intention can either be to simply gain knowledge or to illegally make changes. <br \/>\r<br>Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='149156' \/><input type='hidden' id='answerType149156' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149156[]' id='answer-id-607092' class='answer   answerof-149156 ' value='607092'   \/><label for='answer-id-607092' id='answer-label-607092' class=' answer'><span>Suicide Hacker<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149156[]' id='answer-id-607093' class='answer   answerof-149156 ' value='607093'   \/><label for='answer-id-607093' id='answer-label-607093' class=' answer'><span>Black Hat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149156[]' id='answer-id-607094' class='answer   answerof-149156 ' value='607094'   \/><label for='answer-id-607094' id='answer-label-607094' class=' answer'><span>White Hat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149156[]' id='answer-id-607095' class='answer   answerof-149156 ' value='607095'   \/><label for='answer-id-607095' id='answer-label-607095' class=' answer'><span>Gray Hat<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-149157'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Which of the below hashing functions are not recommended for use?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='149157' \/><input type='hidden' id='answerType149157' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149157[]' id='answer-id-607096' class='answer   answerof-149157 ' value='607096'   \/><label for='answer-id-607096' id='answer-label-607096' class=' answer'><span>SHA-1.ECC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149157[]' id='answer-id-607097' class='answer   answerof-149157 ' value='607097'   \/><label for='answer-id-607097' id='answer-label-607097' class=' answer'><span>MD5, SHA-1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149157[]' id='answer-id-607098' class='answer   answerof-149157 ' value='607098'   \/><label for='answer-id-607098' id='answer-label-607098' class=' answer'><span>SHA-2. SHA-3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149157[]' id='answer-id-607099' class='answer   answerof-149157 ' value='607099'   \/><label for='answer-id-607099' id='answer-label-607099' class=' answer'><span>MD5. SHA-5<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-149158'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. <br \/>\r<br>What type of breach has the individual just performed?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='149158' \/><input type='hidden' id='answerType149158' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149158[]' id='answer-id-607100' class='answer   answerof-149158 ' value='607100'   \/><label for='answer-id-607100' id='answer-label-607100' class=' answer'><span>Reverse Social Engineering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149158[]' id='answer-id-607101' class='answer   answerof-149158 ' value='607101'   \/><label for='answer-id-607101' id='answer-label-607101' class=' answer'><span>Tailgating<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149158[]' id='answer-id-607102' class='answer   answerof-149158 ' value='607102'   \/><label for='answer-id-607102' id='answer-label-607102' class=' answer'><span>Piggybacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149158[]' id='answer-id-607103' class='answer   answerof-149158 ' value='607103'   \/><label for='answer-id-607103' id='answer-label-607103' class=' answer'><span>Announced<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-149159'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Which of the following is the best countermeasure to encrypting ransomwares?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='149159' \/><input type='hidden' id='answerType149159' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149159[]' id='answer-id-607104' class='answer   answerof-149159 ' value='607104'   \/><label for='answer-id-607104' id='answer-label-607104' class=' answer'><span>Use multiple antivirus softwares<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149159[]' id='answer-id-607105' class='answer   answerof-149159 ' value='607105'   \/><label for='answer-id-607105' id='answer-label-607105' class=' answer'><span>Keep some generation of off-line backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149159[]' id='answer-id-607106' class='answer   answerof-149159 ' value='607106'   \/><label for='answer-id-607106' id='answer-label-607106' class=' answer'><span>Analyze the ransomware to get decryption key of encrypted data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149159[]' id='answer-id-607107' class='answer   answerof-149159 ' value='607107'   \/><label for='answer-id-607107' id='answer-label-607107' class=' answer'><span>Pay a ransom<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-149160'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>If an attacker uses the command SELECT*FROM user WHERE name = \u2018x\u2019 AND userid IS NULL; --\u2018; which type of SQL injection attack is the attacker performing?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='149160' \/><input type='hidden' id='answerType149160' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149160[]' id='answer-id-607108' class='answer   answerof-149160 ' value='607108'   \/><label for='answer-id-607108' id='answer-label-607108' class=' answer'><span>End of Line Comment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149160[]' id='answer-id-607109' class='answer   answerof-149160 ' value='607109'   \/><label for='answer-id-607109' id='answer-label-607109' class=' answer'><span>UNION SQL Injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149160[]' id='answer-id-607110' class='answer   answerof-149160 ' value='607110'   \/><label for='answer-id-607110' id='answer-label-607110' class=' answer'><span>Illegal\/Logically Incorrect Query<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149160[]' id='answer-id-607111' class='answer   answerof-149160 ' value='607111'   \/><label for='answer-id-607111' id='answer-label-607111' class=' answer'><span>Tautology<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-149161'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='149161' \/><input type='hidden' id='answerType149161' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149161[]' id='answer-id-607112' class='answer   answerof-149161 ' value='607112'   \/><label for='answer-id-607112' id='answer-label-607112' class=' answer'><span>Produces less false positives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149161[]' id='answer-id-607113' class='answer   answerof-149161 ' value='607113'   \/><label for='answer-id-607113' id='answer-label-607113' class=' answer'><span>Can identify unknown attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149161[]' id='answer-id-607114' class='answer   answerof-149161 ' value='607114'   \/><label for='answer-id-607114' id='answer-label-607114' class=' answer'><span>Requires vendor updates for a new threat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149161[]' id='answer-id-607115' class='answer   answerof-149161 ' value='607115'   \/><label for='answer-id-607115' id='answer-label-607115' class=' answer'><span>Cannot deal with encrypted network traffic<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-149162'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following act requires employer\u2019s standard national numbers to identify them on standard transactions?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='149162' \/><input type='hidden' id='answerType149162' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149162[]' id='answer-id-607116' class='answer   answerof-149162 ' value='607116'   \/><label for='answer-id-607116' id='answer-label-607116' class=' answer'><span>SOX<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149162[]' id='answer-id-607117' class='answer   answerof-149162 ' value='607117'   \/><label for='answer-id-607117' id='answer-label-607117' class=' answer'><span>HIPAA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149162[]' id='answer-id-607118' class='answer   answerof-149162 ' value='607118'   \/><label for='answer-id-607118' id='answer-label-607118' class=' answer'><span>DMCA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149162[]' id='answer-id-607119' class='answer   answerof-149162 ' value='607119'   \/><label for='answer-id-607119' id='answer-label-607119' class=' answer'><span>PCI-DSS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-149163'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>In Wireshark, the packet bytes panes show the data of the current packet in which format?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='149163' \/><input type='hidden' id='answerType149163' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149163[]' id='answer-id-607120' class='answer   answerof-149163 ' value='607120'   \/><label for='answer-id-607120' id='answer-label-607120' class=' answer'><span>Decimal<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149163[]' id='answer-id-607121' class='answer   answerof-149163 ' value='607121'   \/><label for='answer-id-607121' id='answer-label-607121' class=' answer'><span>ASCII only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149163[]' id='answer-id-607122' class='answer   answerof-149163 ' value='607122'   \/><label for='answer-id-607122' id='answer-label-607122' class=' answer'><span>Binary<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149163[]' id='answer-id-607123' class='answer   answerof-149163 ' value='607123'   \/><label for='answer-id-607123' id='answer-label-607123' class=' answer'><span>Hexadecimal<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-149164'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Which of the following is considered as one of the most reliable forms of TCP scanning?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='149164' \/><input type='hidden' id='answerType149164' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149164[]' id='answer-id-607124' class='answer   answerof-149164 ' value='607124'   \/><label for='answer-id-607124' id='answer-label-607124' class=' answer'><span>TCP Connect\/Full Open Scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149164[]' id='answer-id-607125' class='answer   answerof-149164 ' value='607125'   \/><label for='answer-id-607125' id='answer-label-607125' class=' answer'><span>Half-open Scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149164[]' id='answer-id-607126' class='answer   answerof-149164 ' value='607126'   \/><label for='answer-id-607126' id='answer-label-607126' class=' answer'><span>NULL Scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149164[]' id='answer-id-607127' class='answer   answerof-149164 ' value='607127'   \/><label for='answer-id-607127' id='answer-label-607127' class=' answer'><span>Xmas Scan<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-149165'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='149165' \/><input type='hidden' id='answerType149165' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149165[]' id='answer-id-607128' class='answer   answerof-149165 ' value='607128'   \/><label for='answer-id-607128' id='answer-label-607128' class=' answer'><span>ICMP Echo scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149165[]' id='answer-id-607129' class='answer   answerof-149165 ' value='607129'   \/><label for='answer-id-607129' id='answer-label-607129' class=' answer'><span>SYN\/FIN scanning using IP fragments<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149165[]' id='answer-id-607130' class='answer   answerof-149165 ' value='607130'   \/><label for='answer-id-607130' id='answer-label-607130' class=' answer'><span>ACK flag probe scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149165[]' id='answer-id-607131' class='answer   answerof-149165 ' value='607131'   \/><label for='answer-id-607131' id='answer-label-607131' class=' answer'><span>IPID scanning<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-149166'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>What is the purpose of a demilitarized zone on a network?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='149166' \/><input type='hidden' id='answerType149166' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149166[]' id='answer-id-607132' class='answer   answerof-149166 ' value='607132'   \/><label for='answer-id-607132' id='answer-label-607132' class=' answer'><span>To scan all traffic coming through the DMZ to the internal network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149166[]' id='answer-id-607133' class='answer   answerof-149166 ' value='607133'   \/><label for='answer-id-607133' id='answer-label-607133' class=' answer'><span>To only provide direct access to the nodes within the DMZ and protect the network behind it<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149166[]' id='answer-id-607134' class='answer   answerof-149166 ' value='607134'   \/><label for='answer-id-607134' id='answer-label-607134' class=' answer'><span>To provide a place to put the honeypot<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149166[]' id='answer-id-607135' class='answer   answerof-149166 ' value='607135'   \/><label for='answer-id-607135' id='answer-label-607135' class=' answer'><span>To contain the network devices you wish to protect<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-149167'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>You need to deploy a ned needs to be available on the Internet. <br \/>\r<br>What is the recommended architecture in terms of server placement?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='149167' \/><input type='hidden' id='answerType149167' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149167[]' id='answer-id-607136' class='answer   answerof-149167 ' value='607136'   \/><label for='answer-id-607136' id='answer-label-607136' class=' answer'><span>All three servers need to be placed internally<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149167[]' id='answer-id-607137' class='answer   answerof-149167 ' value='607137'   \/><label for='answer-id-607137' id='answer-label-607137' class=' answer'><span>A web server facing the Internet, an application server on the internal network, a database server on the internal network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149167[]' id='answer-id-607138' class='answer   answerof-149167 ' value='607138'   \/><label for='answer-id-607138' id='answer-label-607138' class=' answer'><span>A web server and the database server facing the Internet, an application server on the internal network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149167[]' id='answer-id-607139' class='answer   answerof-149167 ' value='607139'   \/><label for='answer-id-607139' id='answer-label-607139' class=' answer'><span>All three servers need tw web-based software package for your organization. The package requires three separate servers an \r\no face the Internet so that they can communicate between themselves<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-149168'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router, nobody can access to the ftp, and the permitted hosts cannot access the Internet. <br \/>\r<br>According to the next configuration, what is happening in the network? <br \/>\r<br><br><img decoding=\"async\" width=450 height=63 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2020\/10\/image002-4.jpg\" v:shapes=\"_x0000_i1025\"><br><\/div><input type='hidden' name='question_id[]' id='qID_45' value='149168' \/><input type='hidden' id='answerType149168' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149168[]' id='answer-id-607140' class='answer   answerof-149168 ' value='607140'   \/><label for='answer-id-607140' id='answer-label-607140' class=' answer'><span>The ACL 104 needs to be first because is UDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149168[]' id='answer-id-607141' class='answer   answerof-149168 ' value='607141'   \/><label for='answer-id-607141' id='answer-label-607141' class=' answer'><span>The ACL 110 needs to be changed to port 80<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149168[]' id='answer-id-607142' class='answer   answerof-149168 ' value='607142'   \/><label for='answer-id-607142' id='answer-label-607142' class=' answer'><span>The ACL for FTP must be before the ACL 110<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149168[]' id='answer-id-607143' class='answer   answerof-149168 ' value='607143'   \/><label for='answer-id-607143' id='answer-label-607143' class=' answer'><span>The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-149169'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. <br \/>\r<br>Which of the following cannot be performed by the passive network sniffing?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='149169' \/><input type='hidden' id='answerType149169' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149169[]' id='answer-id-607144' class='answer   answerof-149169 ' value='607144'   \/><label for='answer-id-607144' id='answer-label-607144' class=' answer'><span>Identifying operating systems, services, protocols and devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149169[]' id='answer-id-607145' class='answer   answerof-149169 ' value='607145'   \/><label for='answer-id-607145' id='answer-label-607145' class=' answer'><span>Modifying and replaying captured network traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149169[]' id='answer-id-607146' class='answer   answerof-149169 ' value='607146'   \/><label for='answer-id-607146' id='answer-label-607146' class=' answer'><span>Collecting unencrypted information about usernames and passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149169[]' id='answer-id-607147' class='answer   answerof-149169 ' value='607147'   \/><label for='answer-id-607147' id='answer-label-607147' class=' answer'><span>Capturing a network traffic for further analysis<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-149170'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key. <br \/>\r<br>Suppose a malicious user Rob tries to get access to the account of a benign user Ned. <br \/>\r<br>Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='149170' \/><input type='hidden' id='answerType149170' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149170[]' id='answer-id-607148' class='answer   answerof-149170 ' value='607148'   \/><label for='answer-id-607148' id='answer-label-607148' class=' answer'><span>\u201cGET\/restricted\/goldtransfer?to=Rob&amp;from=1 or 1=1\u2019 HTTP\/1.1Host: westbank.com\u201d<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149170[]' id='answer-id-607149' class='answer   answerof-149170 ' value='607149'   \/><label for='answer-id-607149' id='answer-label-607149' class=' answer'><span>\u201cGET\/restricted\/accounts\/?name=Ned HTTP\/1.1 Host: westbank.com\u201d<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149170[]' id='answer-id-607150' class='answer   answerof-149170 ' value='607150'   \/><label for='answer-id-607150' id='answer-label-607150' class=' answer'><span>\u201cGET\/restricted\/bank.getaccount(\u2018Ned\u2019) HTTP\/1.1 Host: westbank.com\u201d<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149170[]' id='answer-id-607151' class='answer   answerof-149170 ' value='607151'   \/><label for='answer-id-607151' id='answer-label-607151' class=' answer'><span>\u201cGET\/restricted\/r<br>%00account%00Ned%00access HTTP\/1.1 Host: westbank.com\u201d<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-149171'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>What type of vulnerability\/attack is it when the malicious person forces the user\u2019s browser to send an authenticated request to a server?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='149171' \/><input type='hidden' id='answerType149171' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149171[]' id='answer-id-607152' class='answer   answerof-149171 ' value='607152'   \/><label for='answer-id-607152' id='answer-label-607152' class=' answer'><span>Cross-site request forgery<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149171[]' id='answer-id-607153' class='answer   answerof-149171 ' value='607153'   \/><label for='answer-id-607153' id='answer-label-607153' class=' answer'><span>Cross-site scripting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149171[]' id='answer-id-607154' class='answer   answerof-149171 ' value='607154'   \/><label for='answer-id-607154' id='answer-label-607154' class=' answer'><span>Session hijacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149171[]' id='answer-id-607155' class='answer   answerof-149171 ' value='607155'   \/><label for='answer-id-607155' id='answer-label-607155' class=' answer'><span>Server side request forgery<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-149172'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>From the following table, identify the wrong answer in terms of Range (ft). <br \/>\r<br><br><img decoding=\"async\" width=214 height=100 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2020\/10\/image004-3.jpg\" v:shapes=\"_x0000_i1026\"><br><\/div><input type='hidden' name='question_id[]' id='qID_49' value='149172' \/><input type='hidden' id='answerType149172' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149172[]' id='answer-id-607156' class='answer   answerof-149172 ' value='607156'   \/><label for='answer-id-607156' id='answer-label-607156' class=' answer'><span>802.11b<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149172[]' id='answer-id-607157' class='answer   answerof-149172 ' value='607157'   \/><label for='answer-id-607157' id='answer-label-607157' class=' answer'><span>802.11g<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149172[]' id='answer-id-607158' class='answer   answerof-149172 ' value='607158'   \/><label for='answer-id-607158' id='answer-label-607158' class=' answer'><span>802.16(WiMax)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149172[]' id='answer-id-607159' class='answer   answerof-149172 ' value='607159'   \/><label for='answer-id-607159' id='answer-label-607159' class=' answer'><span>802.11a<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-149173'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>What would you enter, if you wanted to perform a stealth scan using Nmap?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='149173' \/><input type='hidden' id='answerType149173' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149173[]' id='answer-id-607160' class='answer   answerof-149173 ' value='607160'   \/><label for='answer-id-607160' id='answer-label-607160' class=' answer'><span>nmap -sU<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149173[]' id='answer-id-607161' class='answer   answerof-149173 ' value='607161'   \/><label for='answer-id-607161' id='answer-label-607161' class=' answer'><span>nmap -sS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149173[]' id='answer-id-607162' class='answer   answerof-149173 ' value='607162'   \/><label for='answer-id-607162' id='answer-label-607162' class=' answer'><span>nmap -sM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149173[]' id='answer-id-607163' class='answer   answerof-149173 ' value='607163'   \/><label for='answer-id-607163' id='answer-label-607163' class=' answer'><span>nmap -sT<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-149174'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. <br \/>\r<br>A camera captures people walking and identifies the individuals using Steve\u2019s approach. <br \/>\r<br>After that, people must approximate their RFID badges. Both the identifications are required to open the door. <br \/>\r<br>In this case, we can say:<\/div><input type='hidden' name='question_id[]' id='qID_51' value='149174' \/><input type='hidden' id='answerType149174' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149174[]' id='answer-id-607164' class='answer   answerof-149174 ' value='607164'   \/><label for='answer-id-607164' id='answer-label-607164' class=' answer'><span>Although the approach has two phases, it actually implements just one authentication factor<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149174[]' id='answer-id-607165' class='answer   answerof-149174 ' value='607165'   \/><label for='answer-id-607165' id='answer-label-607165' class=' answer'><span>The solution implements the two authentication factors: physical object and physical characteristic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149174[]' id='answer-id-607166' class='answer   answerof-149174 ' value='607166'   \/><label for='answer-id-607166' id='answer-label-607166' class=' answer'><span>The solution will have a high level of false positives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149174[]' id='answer-id-607167' class='answer   answerof-149174 ' value='607167'   \/><label for='answer-id-607167' id='answer-label-607167' class=' answer'><span>Biological motion cannot be used to identify people<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-149175'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Which protocol is used for setting up secure channels between two devices, typically in VPNs?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='149175' \/><input type='hidden' id='answerType149175' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149175[]' id='answer-id-607168' class='answer   answerof-149175 ' value='607168'   \/><label for='answer-id-607168' id='answer-label-607168' class=' answer'><span>PPP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149175[]' id='answer-id-607169' class='answer   answerof-149175 ' value='607169'   \/><label for='answer-id-607169' id='answer-label-607169' class=' answer'><span>IPSEC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149175[]' id='answer-id-607170' class='answer   answerof-149175 ' value='607170'   \/><label for='answer-id-607170' id='answer-label-607170' class=' answer'><span>PEM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149175[]' id='answer-id-607171' class='answer   answerof-149175 ' value='607171'   \/><label for='answer-id-607171' id='answer-label-607171' class=' answer'><span>SET<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-149176'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='149176' \/><input type='hidden' id='answerType149176' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149176[]' id='answer-id-607172' class='answer   answerof-149176 ' value='607172'   \/><label for='answer-id-607172' id='answer-label-607172' class=' answer'><span>SHA-2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149176[]' id='answer-id-607173' class='answer   answerof-149176 ' value='607173'   \/><label for='answer-id-607173' id='answer-label-607173' class=' answer'><span>SHA-3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149176[]' id='answer-id-607174' class='answer   answerof-149176 ' value='607174'   \/><label for='answer-id-607174' id='answer-label-607174' class=' answer'><span>SHA-1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149176[]' id='answer-id-607175' class='answer   answerof-149176 ' value='607175'   \/><label for='answer-id-607175' id='answer-label-607175' class=' answer'><span>SHA-0<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-149177'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='149177' \/><input type='hidden' id='answerType149177' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149177[]' id='answer-id-607176' class='answer   answerof-149177 ' value='607176'   \/><label for='answer-id-607176' id='answer-label-607176' class=' answer'><span>Bootrom Exploit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149177[]' id='answer-id-607177' class='answer   answerof-149177 ' value='607177'   \/><label for='answer-id-607177' id='answer-label-607177' class=' answer'><span>iBoot Exploit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149177[]' id='answer-id-607178' class='answer   answerof-149177 ' value='607178'   \/><label for='answer-id-607178' id='answer-label-607178' class=' answer'><span>Sandbox Exploit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149177[]' id='answer-id-607179' class='answer   answerof-149177 ' value='607179'   \/><label for='answer-id-607179' id='answer-label-607179' class=' answer'><span>Userland Exploit<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-149178'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.<\/div><input type='hidden' name='question_id[]' id='qID_55' value='149178' \/><input type='hidden' id='answerType149178' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149178[]' id='answer-id-607180' class='answer   answerof-149178 ' value='607180'   \/><label for='answer-id-607180' id='answer-label-607180' class=' answer'><span>SQL injection attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149178[]' id='answer-id-607181' class='answer   answerof-149178 ' value='607181'   \/><label for='answer-id-607181' id='answer-label-607181' class=' answer'><span>Cross-Site Scripting (XSS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149178[]' id='answer-id-607182' class='answer   answerof-149178 ' value='607182'   \/><label for='answer-id-607182' id='answer-label-607182' class=' answer'><span>LDAP Injection attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149178[]' id='answer-id-607183' class='answer   answerof-149178 ' value='607183'   \/><label for='answer-id-607183' id='answer-label-607183' class=' answer'><span>Cross-Site Request Forgery (CSRF)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-149179'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>You are attempting to run an Nmap port scan on a web server. <br \/>\r<br>Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='149179' \/><input type='hidden' id='answerType149179' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149179[]' id='answer-id-607184' class='answer   answerof-149179 ' value='607184'   \/><label for='answer-id-607184' id='answer-label-607184' class=' answer'><span>nmap CA - Pn<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149179[]' id='answer-id-607185' class='answer   answerof-149179 ' value='607185'   \/><label for='answer-id-607185' id='answer-label-607185' class=' answer'><span>nmap CsP Cp-65535-T5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149179[]' id='answer-id-607186' class='answer   answerof-149179 ' value='607186'   \/><label for='answer-id-607186' id='answer-label-607186' class=' answer'><span>nmap CsT CO CT0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149179[]' id='answer-id-607187' class='answer   answerof-149179 ' value='607187'   \/><label for='answer-id-607187' id='answer-label-607187' class=' answer'><span>nmap CA --host-timeout 99-T1<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-149180'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>Code injection is a form of attack in which a malicious user:<\/div><input type='hidden' name='question_id[]' id='qID_57' value='149180' \/><input type='hidden' id='answerType149180' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149180[]' id='answer-id-607188' class='answer   answerof-149180 ' value='607188'   \/><label for='answer-id-607188' id='answer-label-607188' class=' answer'><span>Inserts text into a data field that gets interpreted as code<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149180[]' id='answer-id-607189' class='answer   answerof-149180 ' value='607189'   \/><label for='answer-id-607189' id='answer-label-607189' class=' answer'><span>Gets the server to execute arbitrary code using a buffer overflow<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149180[]' id='answer-id-607190' class='answer   answerof-149180 ' value='607190'   \/><label for='answer-id-607190' id='answer-label-607190' class=' answer'><span>Inserts additional code into the JavaScript running in the browser<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149180[]' id='answer-id-607191' class='answer   answerof-149180 ' value='607191'   \/><label for='answer-id-607191' id='answer-label-607191' class=' answer'><span>Gains access to the codebase on the server and inserts new code<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-149181'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>The collection of potentially actionable, overt, and publicly available information is known as<\/div><input type='hidden' name='question_id[]' id='qID_58' value='149181' \/><input type='hidden' id='answerType149181' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149181[]' id='answer-id-607192' class='answer   answerof-149181 ' value='607192'   \/><label for='answer-id-607192' id='answer-label-607192' class=' answer'><span>Open-source intelligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149181[]' id='answer-id-607193' class='answer   answerof-149181 ' value='607193'   \/><label for='answer-id-607193' id='answer-label-607193' class=' answer'><span>Human intelligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149181[]' id='answer-id-607194' class='answer   answerof-149181 ' value='607194'   \/><label for='answer-id-607194' id='answer-label-607194' class=' answer'><span>Social intelligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149181[]' id='answer-id-607195' class='answer   answerof-149181 ' value='607195'   \/><label for='answer-id-607195' id='answer-label-607195' class=' answer'><span>Real intelligence<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-149182'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='149182' \/><input type='hidden' id='answerType149182' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149182[]' id='answer-id-607196' class='answer   answerof-149182 ' value='607196'   \/><label for='answer-id-607196' id='answer-label-607196' class=' answer'><span>[cache:]<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149182[]' id='answer-id-607197' class='answer   answerof-149182 ' value='607197'   \/><label for='answer-id-607197' id='answer-label-607197' class=' answer'><span>[site:]<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149182[]' id='answer-id-607198' class='answer   answerof-149182 ' value='607198'   \/><label for='answer-id-607198' id='answer-label-607198' class=' answer'><span>[inurl:]<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149182[]' id='answer-id-607199' class='answer   answerof-149182 ' value='607199'   \/><label for='answer-id-607199' id='answer-label-607199' class=' answer'><span>[link:]<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-149183'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. <br \/>\r<br>Which of the following types of firewalls can protect against SQL injection attacks?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='149183' \/><input type='hidden' id='answerType149183' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149183[]' id='answer-id-607200' class='answer   answerof-149183 ' value='607200'   \/><label for='answer-id-607200' id='answer-label-607200' class=' answer'><span>Data-driven firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149183[]' id='answer-id-607201' class='answer   answerof-149183 ' value='607201'   \/><label for='answer-id-607201' id='answer-label-607201' class=' answer'><span>Stateful firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149183[]' id='answer-id-607202' class='answer   answerof-149183 ' value='607202'   \/><label for='answer-id-607202' id='answer-label-607202' class=' answer'><span>Packet firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149183[]' id='answer-id-607203' class='answer   answerof-149183 ' value='607203'   \/><label for='answer-id-607203' id='answer-label-607203' class=' answer'><span>Web application firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-149184'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='149184' \/><input type='hidden' id='answerType149184' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149184[]' id='answer-id-607204' class='answer   answerof-149184 ' value='607204'   \/><label for='answer-id-607204' id='answer-label-607204' class=' answer'><span>Chosen-plaintext attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149184[]' id='answer-id-607205' class='answer   answerof-149184 ' value='607205'   \/><label for='answer-id-607205' id='answer-label-607205' class=' answer'><span>Ciphertext-only attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149184[]' id='answer-id-607206' class='answer   answerof-149184 ' value='607206'   \/><label for='answer-id-607206' id='answer-label-607206' class=' answer'><span>Adaptive chosen-plaintext attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149184[]' id='answer-id-607207' class='answer   answerof-149184 ' value='607207'   \/><label for='answer-id-607207' id='answer-label-607207' class=' answer'><span>Known-plaintext attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-149185'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user\u2019s browser to send malicious requests they did not intend?<\/div><input type='hidden' name='question_id[]' id='qID_62' value='149185' \/><input type='hidden' id='answerType149185' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149185[]' id='answer-id-607208' class='answer   answerof-149185 ' value='607208'   \/><label for='answer-id-607208' id='answer-label-607208' class=' answer'><span>Command Injection Attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149185[]' id='answer-id-607209' class='answer   answerof-149185 ' value='607209'   \/><label for='answer-id-607209' id='answer-label-607209' class=' answer'><span>File Injection Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149185[]' id='answer-id-607210' class='answer   answerof-149185 ' value='607210'   \/><label for='answer-id-607210' id='answer-label-607210' class=' answer'><span>Cross-Site Request Forgery (CSRF)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149185[]' id='answer-id-607211' class='answer   answerof-149185 ' value='607211'   \/><label for='answer-id-607211' id='answer-label-607211' class=' answer'><span>Hidden Field Manipulation Attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-149186'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>Which is the first step followed by Vulnerability Scanners for scanning a network?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='149186' \/><input type='hidden' id='answerType149186' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149186[]' id='answer-id-607212' class='answer   answerof-149186 ' value='607212'   \/><label for='answer-id-607212' id='answer-label-607212' class=' answer'><span>TCP\/UDP Port scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149186[]' id='answer-id-607213' class='answer   answerof-149186 ' value='607213'   \/><label for='answer-id-607213' id='answer-label-607213' class=' answer'><span>Firewall detection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149186[]' id='answer-id-607214' class='answer   answerof-149186 ' value='607214'   \/><label for='answer-id-607214' id='answer-label-607214' class=' answer'><span>OS Detection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149186[]' id='answer-id-607215' class='answer   answerof-149186 ' value='607215'   \/><label for='answer-id-607215' id='answer-label-607215' class=' answer'><span>Checking if the remote host is alive<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-149187'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. <br \/>\r<br>Which of the following attack scenarios will compromise the privacy of her data?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='149187' \/><input type='hidden' id='answerType149187' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149187[]' id='answer-id-607216' class='answer   answerof-149187 ' value='607216'   \/><label for='answer-id-607216' id='answer-label-607216' class=' answer'><span>None of these scenarios compromise the privacy of Alice\u2019s data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149187[]' id='answer-id-607217' class='answer   answerof-149187 ' value='607217'   \/><label for='answer-id-607217' id='answer-label-607217' class=' answer'><span>Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrew\u2019s attempt to access the stored data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149187[]' id='answer-id-607218' class='answer   answerof-149187 ' value='607218'   \/><label for='answer-id-607218' id='answer-label-607218' class=' answer'><span>Hacker Harry breaks into the cloud server and steals the encrypted data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149187[]' id='answer-id-607219' class='answer   answerof-149187 ' value='607219'   \/><label for='answer-id-607219' id='answer-label-607219' class=' answer'><span>Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-149188'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>A hacker named Jack is trying to compromise a bank\u2019s computer system. He needs to know the operating system of that computer to launch further attacks. <br \/>\r<br>What process would help him?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='149188' \/><input type='hidden' id='answerType149188' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149188[]' id='answer-id-607220' class='answer   answerof-149188 ' value='607220'   \/><label for='answer-id-607220' id='answer-label-607220' class=' answer'><span>Banner Grabbing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149188[]' id='answer-id-607221' class='answer   answerof-149188 ' value='607221'   \/><label for='answer-id-607221' id='answer-label-607221' class=' answer'><span>IDLE\/IPID Scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149188[]' id='answer-id-607222' class='answer   answerof-149188 ' value='607222'   \/><label for='answer-id-607222' id='answer-label-607222' class=' answer'><span>SSDP Scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149188[]' id='answer-id-607223' class='answer   answerof-149188 ' value='607223'   \/><label for='answer-id-607223' id='answer-label-607223' class=' answer'><span>UDP Scanning<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-149189'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. <br \/>\r<br>He identified this when the IDS alerted for malware activities in the network. <br \/>\r<br>What should Bob do to avoid this problem?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='149189' \/><input type='hidden' id='answerType149189' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149189[]' id='answer-id-607224' class='answer   answerof-149189 ' value='607224'   \/><label for='answer-id-607224' id='answer-label-607224' class=' answer'><span>Disable unused ports in the switches<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149189[]' id='answer-id-607225' class='answer   answerof-149189 ' value='607225'   \/><label for='answer-id-607225' id='answer-label-607225' class=' answer'><span>Separate students in a different VLAN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149189[]' id='answer-id-607226' class='answer   answerof-149189 ' value='607226'   \/><label for='answer-id-607226' id='answer-label-607226' class=' answer'><span>Use the 802.1x protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149189[]' id='answer-id-607227' class='answer   answerof-149189 ' value='607227'   \/><label for='answer-id-607227' id='answer-label-607227' class=' answer'><span>Ask students to use the wireless network<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-149190'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient\u2019s consent, similar to email spamming?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='149190' \/><input type='hidden' id='answerType149190' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149190[]' id='answer-id-607228' class='answer   answerof-149190 ' value='607228'   \/><label for='answer-id-607228' id='answer-label-607228' class=' answer'><span>Bluesmacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149190[]' id='answer-id-607229' class='answer   answerof-149190 ' value='607229'   \/><label for='answer-id-607229' id='answer-label-607229' class=' answer'><span>Bluesniffing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149190[]' id='answer-id-607230' class='answer   answerof-149190 ' value='607230'   \/><label for='answer-id-607230' id='answer-label-607230' class=' answer'><span>Bluesnarfing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149190[]' id='answer-id-607231' class='answer   answerof-149190 ' value='607231'   \/><label for='answer-id-607231' id='answer-label-607231' class=' answer'><span>Bluejacking<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-149191'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>Which of the following program infects the system boot sector and the executable files at the same time?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='149191' \/><input type='hidden' id='answerType149191' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149191[]' id='answer-id-607232' class='answer   answerof-149191 ' value='607232'   \/><label for='answer-id-607232' id='answer-label-607232' class=' answer'><span>Stealth virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149191[]' id='answer-id-607233' class='answer   answerof-149191 ' value='607233'   \/><label for='answer-id-607233' id='answer-label-607233' class=' answer'><span>Polymorphic virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149191[]' id='answer-id-607234' class='answer   answerof-149191 ' value='607234'   \/><label for='answer-id-607234' id='answer-label-607234' class=' answer'><span>Macro virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149191[]' id='answer-id-607235' class='answer   answerof-149191 ' value='607235'   \/><label for='answer-id-607235' id='answer-label-607235' class=' answer'><span>Multipartite Virus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-149192'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. <br \/>\r<br>Which of the below scanning technique will you use?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='149192' \/><input type='hidden' id='answerType149192' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149192[]' id='answer-id-607236' class='answer   answerof-149192 ' value='607236'   \/><label for='answer-id-607236' id='answer-label-607236' class=' answer'><span>ACK flag scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149192[]' id='answer-id-607237' class='answer   answerof-149192 ' value='607237'   \/><label for='answer-id-607237' id='answer-label-607237' class=' answer'><span>TCP Scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149192[]' id='answer-id-607238' class='answer   answerof-149192 ' value='607238'   \/><label for='answer-id-607238' id='answer-label-607238' class=' answer'><span>IP Fragment Scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149192[]' id='answer-id-607239' class='answer   answerof-149192 ' value='607239'   \/><label for='answer-id-607239' id='answer-label-607239' class=' answer'><span>Inverse TCP flag scanning<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-149193'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>You perform a scan of your company\u2019s network and discover that TCP port 123 is open. <br \/>\r<br>What services by default run on TCP port 123?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='149193' \/><input type='hidden' id='answerType149193' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149193[]' id='answer-id-607240' class='answer   answerof-149193 ' value='607240'   \/><label for='answer-id-607240' id='answer-label-607240' class=' answer'><span>Telnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149193[]' id='answer-id-607241' class='answer   answerof-149193 ' value='607241'   \/><label for='answer-id-607241' id='answer-label-607241' class=' answer'><span>POP3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149193[]' id='answer-id-607242' class='answer   answerof-149193 ' value='607242'   \/><label for='answer-id-607242' id='answer-label-607242' class=' answer'><span>Network Time Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149193[]' id='answer-id-607243' class='answer   answerof-149193 ' value='607243'   \/><label for='answer-id-607243' id='answer-label-607243' class=' answer'><span>DNS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-149194'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>Based on the below log, which of the following sentences are true? <br \/>\r<br>Mar 1, 2016, 7:33:28 AM 10.240.250.23 C 54373 10.249.253.15 C 22 tcp_ip<\/div><input type='hidden' name='question_id[]' id='qID_71' value='149194' \/><input type='hidden' id='answerType149194' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149194[]' id='answer-id-607244' class='answer   answerof-149194 ' value='607244'   \/><label for='answer-id-607244' id='answer-label-607244' class=' answer'><span>SSH communications are encrypted it\u2019s impossible to know who is the client or the server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149194[]' id='answer-id-607245' class='answer   answerof-149194 ' value='607245'   \/><label for='answer-id-607245' id='answer-label-607245' class=' answer'><span>Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149194[]' id='answer-id-607246' class='answer   answerof-149194 ' value='607246'   \/><label for='answer-id-607246' id='answer-label-607246' class=' answer'><span>Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149194[]' id='answer-id-607247' class='answer   answerof-149194 ' value='607247'   \/><label for='answer-id-607247' id='answer-label-607247' class=' answer'><span>Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-149195'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed. <br \/>\r<br>What command is used to determine if the entry is present in DNS cache?<\/div><input type='hidden' name='question_id[]' id='qID_72' value='149195' \/><input type='hidden' id='answerType149195' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149195[]' id='answer-id-607248' class='answer   answerof-149195 ' value='607248'   \/><label for='answer-id-607248' id='answer-label-607248' class=' answer'><span>nslookup -fullrecursive update.antivirus.com<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149195[]' id='answer-id-607249' class='answer   answerof-149195 ' value='607249'   \/><label for='answer-id-607249' id='answer-label-607249' class=' answer'><span>dnsnooping Crt update.antivirus.com<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149195[]' id='answer-id-607250' class='answer   answerof-149195 ' value='607250'   \/><label for='answer-id-607250' id='answer-label-607250' class=' answer'><span>nslookup -norecursive update.antivirus.com<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149195[]' id='answer-id-607251' class='answer   answerof-149195 ' value='607251'   \/><label for='answer-id-607251' id='answer-label-607251' class=' answer'><span>dns --snoop update.antivirus.com<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-149196'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>Which of the following is an adaptive SQL Injection testing technique used to discover coding errors by inputting massive amounts of random data and observing the changes in the output?<\/div><input type='hidden' name='question_id[]' id='qID_73' value='149196' \/><input type='hidden' id='answerType149196' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149196[]' id='answer-id-607252' class='answer   answerof-149196 ' value='607252'   \/><label for='answer-id-607252' id='answer-label-607252' class=' answer'><span>Function Testing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149196[]' id='answer-id-607253' class='answer   answerof-149196 ' value='607253'   \/><label for='answer-id-607253' id='answer-label-607253' class=' answer'><span>Dynamic Testing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149196[]' id='answer-id-607254' class='answer   answerof-149196 ' value='607254'   \/><label for='answer-id-607254' id='answer-label-607254' class=' answer'><span>Static Testing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149196[]' id='answer-id-607255' class='answer   answerof-149196 ' value='607255'   \/><label for='answer-id-607255' id='answer-label-607255' class=' answer'><span>Fuzzing Testing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-149197'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. <br \/>\r<br>What should Bob recommend to deal with such a threat?<\/div><input type='hidden' name='question_id[]' id='qID_74' value='149197' \/><input type='hidden' id='answerType149197' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149197[]' id='answer-id-607256' class='answer   answerof-149197 ' value='607256'   \/><label for='answer-id-607256' id='answer-label-607256' class=' answer'><span>The use of security agents in clients\u2019 computers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149197[]' id='answer-id-607257' class='answer   answerof-149197 ' value='607257'   \/><label for='answer-id-607257' id='answer-label-607257' class=' answer'><span>The use of DNSSEC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149197[]' id='answer-id-607258' class='answer   answerof-149197 ' value='607258'   \/><label for='answer-id-607258' id='answer-label-607258' class=' answer'><span>The use of double-factor authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149197[]' id='answer-id-607259' class='answer   answerof-149197 ' value='607259'   \/><label for='answer-id-607259' id='answer-label-607259' class=' answer'><span>Client awareness<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-149198'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='149198' \/><input type='hidden' id='answerType149198' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149198[]' id='answer-id-607260' class='answer   answerof-149198 ' value='607260'   \/><label for='answer-id-607260' id='answer-label-607260' class=' answer'><span>Keyed Hashing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149198[]' id='answer-id-607261' class='answer   answerof-149198 ' value='607261'   \/><label for='answer-id-607261' id='answer-label-607261' class=' answer'><span>Key Stretching<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149198[]' id='answer-id-607262' class='answer   answerof-149198 ' value='607262'   \/><label for='answer-id-607262' id='answer-label-607262' class=' answer'><span>Salting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149198[]' id='answer-id-607263' class='answer   answerof-149198 ' value='607263'   \/><label for='answer-id-607263' id='answer-label-607263' class=' answer'><span>Double Hashing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-149199'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='149199' \/><input type='hidden' id='answerType149199' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149199[]' id='answer-id-607264' class='answer   answerof-149199 ' value='607264'   \/><label for='answer-id-607264' id='answer-label-607264' class=' answer'><span>CT0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149199[]' id='answer-id-607265' class='answer   answerof-149199 ' value='607265'   \/><label for='answer-id-607265' id='answer-label-607265' class=' answer'><span>CT5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149199[]' id='answer-id-607266' class='answer   answerof-149199 ' value='607266'   \/><label for='answer-id-607266' id='answer-label-607266' class=' answer'><span>-O<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149199[]' id='answer-id-607267' class='answer   answerof-149199 ' value='607267'   \/><label for='answer-id-607267' id='answer-label-607267' class=' answer'><span>-A<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-149200'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>Which of the following provides a security professional with most information about the system\u2019s security posture?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='149200' \/><input type='hidden' id='answerType149200' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149200[]' id='answer-id-607268' class='answer   answerof-149200 ' value='607268'   \/><label for='answer-id-607268' id='answer-label-607268' class=' answer'><span>Wardriving, warchalking, social engineering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149200[]' id='answer-id-607269' class='answer   answerof-149200 ' value='607269'   \/><label for='answer-id-607269' id='answer-label-607269' class=' answer'><span>Social engineering, company site browsing, tailgating<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149200[]' id='answer-id-607270' class='answer   answerof-149200 ' value='607270'   \/><label for='answer-id-607270' id='answer-label-607270' class=' answer'><span>Phishing, spamming, sending trojans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149200[]' id='answer-id-607271' class='answer   answerof-149200 ' value='607271'   \/><label for='answer-id-607271' id='answer-label-607271' class=' answer'><span>Port scanning, banner grabbing, service identification<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-149201'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. <br \/>\r<br>Which type of virus detection method did Chandler use in this context?<\/div><input type='hidden' name='question_id[]' id='qID_78' value='149201' \/><input type='hidden' id='answerType149201' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149201[]' id='answer-id-607272' class='answer   answerof-149201 ' value='607272'   \/><label for='answer-id-607272' id='answer-label-607272' class=' answer'><span>Heuristic Analysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149201[]' id='answer-id-607273' class='answer   answerof-149201 ' value='607273'   \/><label for='answer-id-607273' id='answer-label-607273' class=' answer'><span>Code Emulation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149201[]' id='answer-id-607274' class='answer   answerof-149201 ' value='607274'   \/><label for='answer-id-607274' id='answer-label-607274' class=' answer'><span>Integrity checking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149201[]' id='answer-id-607275' class='answer   answerof-149201 ' value='607275'   \/><label for='answer-id-607275' id='answer-label-607275' class=' answer'><span>Scanning<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-149202'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>An attacker scans a host with the below command. <br \/>\r<br>Which three flags are set? (Choose three.) <br \/>\r<br>#nmap CsX host.domain.com<\/div><input type='hidden' name='question_id[]' id='qID_79' value='149202' \/><input type='hidden' id='answerType149202' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149202[]' id='answer-id-607276' class='answer   answerof-149202 ' value='607276'   \/><label for='answer-id-607276' id='answer-label-607276' class=' answer'><span>This is ACK scan. ACK flag is set<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149202[]' id='answer-id-607277' class='answer   answerof-149202 ' value='607277'   \/><label for='answer-id-607277' id='answer-label-607277' class=' answer'><span>This is Xmas scan. SYN and ACK flags are set<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149202[]' id='answer-id-607278' class='answer   answerof-149202 ' value='607278'   \/><label for='answer-id-607278' id='answer-label-607278' class=' answer'><span>This is Xmas scan. URG, PUSH and FIN are set<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149202[]' id='answer-id-607279' class='answer   answerof-149202 ' value='607279'   \/><label for='answer-id-607279' id='answer-label-607279' class=' answer'><span>This is SYN scan. SYN flag is set<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-149203'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='149203' \/><input type='hidden' id='answerType149203' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149203[]' id='answer-id-607280' class='answer   answerof-149203 ' value='607280'   \/><label for='answer-id-607280' id='answer-label-607280' class=' answer'><span>Internet Key Exchange (IKE)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149203[]' id='answer-id-607281' class='answer   answerof-149203 ' value='607281'   \/><label for='answer-id-607281' id='answer-label-607281' class=' answer'><span>Oakley<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149203[]' id='answer-id-607282' class='answer   answerof-149203 ' value='607282'   \/><label for='answer-id-607282' id='answer-label-607282' class=' answer'><span>IPsec Policy Agent<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149203[]' id='answer-id-607283' class='answer   answerof-149203 ' value='607283'   \/><label for='answer-id-607283' id='answer-label-607283' class=' answer'><span>IPsec driver<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-149204'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. <br \/>\r<br>When users accessed any page, the applet ran and exploited many machines. <br \/>\r<br>Which one of the following tools the hacker probably used to inject HTML code?<\/div><input type='hidden' name='question_id[]' id='qID_81' value='149204' \/><input type='hidden' id='answerType149204' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149204[]' id='answer-id-607284' class='answer   answerof-149204 ' value='607284'   \/><label for='answer-id-607284' id='answer-label-607284' class=' answer'><span>Wireshark<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149204[]' id='answer-id-607285' class='answer   answerof-149204 ' value='607285'   \/><label for='answer-id-607285' id='answer-label-607285' class=' answer'><span>Ettercap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149204[]' id='answer-id-607286' class='answer   answerof-149204 ' value='607286'   \/><label for='answer-id-607286' id='answer-label-607286' class=' answer'><span>Aircrack-ng<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149204[]' id='answer-id-607287' class='answer   answerof-149204 ' value='607287'   \/><label for='answer-id-607287' id='answer-label-607287' class=' answer'><span>Tcpdump<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-149205'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>You find that it is a CnC communication. <br \/>\r<br>Which of the following solution will you suggest?<\/div><input type='hidden' name='question_id[]' id='qID_82' value='149205' \/><input type='hidden' id='answerType149205' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149205[]' id='answer-id-607288' class='answer   answerof-149205 ' value='607288'   \/><label for='answer-id-607288' id='answer-label-607288' class=' answer'><span>Block the Blacklist IP\u2019s @ Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149205[]' id='answer-id-607289' class='answer   answerof-149205 ' value='607289'   \/><label for='answer-id-607289' id='answer-label-607289' class=' answer'><span>Update the Latest Signatures on your IDS\/IPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149205[]' id='answer-id-607290' class='answer   answerof-149205 ' value='607290'   \/><label for='answer-id-607290' id='answer-label-607290' class=' answer'><span>Clean the Malware which are trying to Communicate with the External Blacklist IP\u2019s<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149205[]' id='answer-id-607291' class='answer   answerof-149205 ' value='607291'   \/><label for='answer-id-607291' id='answer-label-607291' class=' answer'><span>Both B and C<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-149206'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. <br \/>\r<br>What is the main theme of the sub-policies for Information Technologies?<\/div><input type='hidden' name='question_id[]' id='qID_83' value='149206' \/><input type='hidden' id='answerType149206' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149206[]' id='answer-id-607292' class='answer   answerof-149206 ' value='607292'   \/><label for='answer-id-607292' id='answer-label-607292' class=' answer'><span>Availability, Non-repudiation, Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149206[]' id='answer-id-607293' class='answer   answerof-149206 ' value='607293'   \/><label for='answer-id-607293' id='answer-label-607293' class=' answer'><span>Authenticity, Integrity, Non-repudiation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149206[]' id='answer-id-607294' class='answer   answerof-149206 ' value='607294'   \/><label for='answer-id-607294' id='answer-label-607294' class=' answer'><span>Confidentiality, Integrity, Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149206[]' id='answer-id-607295' class='answer   answerof-149206 ' value='607295'   \/><label for='answer-id-607295' id='answer-label-607295' class=' answer'><span>Authenticity, Confidentiality, Integrity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-149207'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?<\/div><input type='hidden' name='question_id[]' id='qID_84' value='149207' \/><input type='hidden' id='answerType149207' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149207[]' id='answer-id-607296' class='answer   answerof-149207 ' value='607296'   \/><label for='answer-id-607296' id='answer-label-607296' class=' answer'><span>Omnidirectional antenna<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149207[]' id='answer-id-607297' class='answer   answerof-149207 ' value='607297'   \/><label for='answer-id-607297' id='answer-label-607297' class=' answer'><span>Dipole antenna<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149207[]' id='answer-id-607298' class='answer   answerof-149207 ' value='607298'   \/><label for='answer-id-607298' id='answer-label-607298' class=' answer'><span>Yagi antenna<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149207[]' id='answer-id-607299' class='answer   answerof-149207 ' value='607299'   \/><label for='answer-id-607299' id='answer-label-607299' class=' answer'><span>Parabolic grid antenna<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-149208'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>Why should the security analyst disable\/remove unnecessary ISAPI filters?<\/div><input type='hidden' name='question_id[]' id='qID_85' value='149208' \/><input type='hidden' id='answerType149208' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149208[]' id='answer-id-607300' class='answer   answerof-149208 ' value='607300'   \/><label for='answer-id-607300' id='answer-label-607300' class=' answer'><span>To defend against social engineering attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149208[]' id='answer-id-607301' class='answer   answerof-149208 ' value='607301'   \/><label for='answer-id-607301' id='answer-label-607301' class=' answer'><span>To defend against webserver attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149208[]' id='answer-id-607302' class='answer   answerof-149208 ' value='607302'   \/><label for='answer-id-607302' id='answer-label-607302' class=' answer'><span>To defend against jailbreaking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149208[]' id='answer-id-607303' class='answer   answerof-149208 ' value='607303'   \/><label for='answer-id-607303' id='answer-label-607303' class=' answer'><span>To defend against wireless attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-86' style=';'><div id='questionWrap-86'  class='   watupro-question-id-149209'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>86. <\/span>If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?<\/div><input type='hidden' name='question_id[]' id='qID_86' value='149209' \/><input type='hidden' id='answerType149209' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149209[]' id='answer-id-607304' class='answer   answerof-149209 ' value='607304'   \/><label for='answer-id-607304' id='answer-label-607304' class=' answer'><span>-sP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149209[]' id='answer-id-607305' class='answer   answerof-149209 ' value='607305'   \/><label for='answer-id-607305' id='answer-label-607305' class=' answer'><span>-P<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149209[]' id='answer-id-607306' class='answer   answerof-149209 ' value='607306'   \/><label for='answer-id-607306' id='answer-label-607306' class=' answer'><span>-r<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149209[]' id='answer-id-607307' class='answer   answerof-149209 ' value='607307'   \/><label for='answer-id-607307' id='answer-label-607307' class=' answer'><span>-F<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-87' style=';'><div id='questionWrap-87'  class='   watupro-question-id-149210'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>87. <\/span>Which of the following statements is TRUE?<\/div><input type='hidden' name='question_id[]' id='qID_87' value='149210' \/><input type='hidden' id='answerType149210' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149210[]' id='answer-id-607308' class='answer   answerof-149210 ' value='607308'   \/><label for='answer-id-607308' id='answer-label-607308' class=' answer'><span>Sniffers operate on Layer 2 of the OSI model<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149210[]' id='answer-id-607309' class='answer   answerof-149210 ' value='607309'   \/><label for='answer-id-607309' id='answer-label-607309' class=' answer'><span>Sniffers operate on Layer 3 of the OSI model<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149210[]' id='answer-id-607310' class='answer   answerof-149210 ' value='607310'   \/><label for='answer-id-607310' id='answer-label-607310' class=' answer'><span>Sniffers operate on both Layer 2 &amp; Layer 3 of the OSI model.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149210[]' id='answer-id-607311' class='answer   answerof-149210 ' value='607311'   \/><label for='answer-id-607311' id='answer-label-607311' class=' answer'><span>Sniffers operate on the Layer 1 of the OSI model.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-88' style=';'><div id='questionWrap-88'  class='   watupro-question-id-149211'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>88. <\/span>What is the least important information when you analyze a public IP address in a security alert?<\/div><input type='hidden' name='question_id[]' id='qID_88' value='149211' \/><input type='hidden' id='answerType149211' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149211[]' id='answer-id-607312' class='answer   answerof-149211 ' value='607312'   \/><label for='answer-id-607312' id='answer-label-607312' class=' answer'><span>ARP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149211[]' id='answer-id-607313' class='answer   answerof-149211 ' value='607313'   \/><label for='answer-id-607313' id='answer-label-607313' class=' answer'><span>Whois<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149211[]' id='answer-id-607314' class='answer   answerof-149211 ' value='607314'   \/><label for='answer-id-607314' id='answer-label-607314' class=' answer'><span>DNS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149211[]' id='answer-id-607315' class='answer   answerof-149211 ' value='607315'   \/><label for='answer-id-607315' id='answer-label-607315' class=' answer'><span>Geolocation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-89' style=';'><div id='questionWrap-89'  class='   watupro-question-id-149212'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>89. <\/span>You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL. <br \/>\r<br>What may be the problem?<\/div><input type='hidden' name='question_id[]' id='qID_89' value='149212' \/><input type='hidden' id='answerType149212' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149212[]' id='answer-id-607316' class='answer   answerof-149212 ' value='607316'   \/><label for='answer-id-607316' id='answer-label-607316' class=' answer'><span>Traffic is Blocked on UDP Port 53<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149212[]' id='answer-id-607317' class='answer   answerof-149212 ' value='607317'   \/><label for='answer-id-607317' id='answer-label-607317' class=' answer'><span>Traffic is Blocked on UDP Port 80<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149212[]' id='answer-id-607318' class='answer   answerof-149212 ' value='607318'   \/><label for='answer-id-607318' id='answer-label-607318' class=' answer'><span>Traffic is Blocked on UDP Port 54<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149212[]' id='answer-id-607319' class='answer   answerof-149212 ' value='607319'   \/><label for='answer-id-607319' id='answer-label-607319' class=' answer'><span>Traffic is Blocked on UDP Port 80<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-90' style=';'><div id='questionWrap-90'  class='   watupro-question-id-149213'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>90. <\/span>On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service. <br \/>\r<br>What is the name of the process by which you can determine those critical business?<\/div><input type='hidden' name='question_id[]' id='qID_90' value='149213' \/><input type='hidden' id='answerType149213' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149213[]' id='answer-id-607320' class='answer   answerof-149213 ' value='607320'   \/><label for='answer-id-607320' id='answer-label-607320' class=' answer'><span>Risk Mitigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149213[]' id='answer-id-607321' class='answer   answerof-149213 ' value='607321'   \/><label for='answer-id-607321' id='answer-label-607321' class=' answer'><span>Emergency Plan Response (EPR)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149213[]' id='answer-id-607322' class='answer   answerof-149213 ' value='607322'   \/><label for='answer-id-607322' id='answer-label-607322' class=' answer'><span>Disaster Recovery Planning (DRP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149213[]' id='answer-id-607323' class='answer   answerof-149213 ' value='607323'   \/><label for='answer-id-607323' id='answer-label-607323' class=' answer'><span>Business Impact Analysis (BIA)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-91' style=';'><div id='questionWrap-91'  class='   watupro-question-id-149214'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>91. <\/span>Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it. The tools are written in JavaScript and can track the customer\u2019s activity on the site. These tools are located on the servers of the marketing company. <br \/>\r<br>What is the main security risk associated with this scenario?<\/div><input type='hidden' name='question_id[]' id='qID_91' value='149214' \/><input type='hidden' id='answerType149214' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149214[]' id='answer-id-607324' class='answer   answerof-149214 ' value='607324'   \/><label for='answer-id-607324' id='answer-label-607324' class=' answer'><span>External script contents could be maliciously modified without the security team knowledge<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149214[]' id='answer-id-607325' class='answer   answerof-149214 ' value='607325'   \/><label for='answer-id-607325' id='answer-label-607325' class=' answer'><span>External scripts have direct access to the company servers and can steal the data from there<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149214[]' id='answer-id-607326' class='answer   answerof-149214 ' value='607326'   \/><label for='answer-id-607326' id='answer-label-607326' class=' answer'><span>There is no risk at all as the marketing services are trustworthy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149214[]' id='answer-id-607327' class='answer   answerof-149214 ' value='607327'   \/><label for='answer-id-607327' id='answer-label-607327' class=' answer'><span>External scripts increase the outbound company data traffic which leads greater financial losses<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-92' style=';'><div id='questionWrap-92'  class='   watupro-question-id-149215'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>92. <\/span>Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends \u201cmany\u201d IP packets, based on the average number of packets sent by all origins and using some thresholds. <br \/>\r<br>In concept, the solution developed by Bob is actually:<\/div><input type='hidden' name='question_id[]' id='qID_92' value='149215' \/><input type='hidden' id='answerType149215' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149215[]' id='answer-id-607328' class='answer   answerof-149215 ' value='607328'   \/><label for='answer-id-607328' id='answer-label-607328' class=' answer'><span>Just a network monitoring tool<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149215[]' id='answer-id-607329' class='answer   answerof-149215 ' value='607329'   \/><label for='answer-id-607329' id='answer-label-607329' class=' answer'><span>A signature-based IDS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149215[]' id='answer-id-607330' class='answer   answerof-149215 ' value='607330'   \/><label for='answer-id-607330' id='answer-label-607330' class=' answer'><span>A hybrid IDS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149215[]' id='answer-id-607331' class='answer   answerof-149215 ' value='607331'   \/><label for='answer-id-607331' id='answer-label-607331' class=' answer'><span>A behavior-based IDS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-93' style=';'><div id='questionWrap-93'  class='   watupro-question-id-149216'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>93. <\/span>When tuning security alerts, what is the best approach?<\/div><input type='hidden' name='question_id[]' id='qID_93' value='149216' \/><input type='hidden' id='answerType149216' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149216[]' id='answer-id-607332' class='answer   answerof-149216 ' value='607332'   \/><label for='answer-id-607332' id='answer-label-607332' class=' answer'><span>Tune to avoid False positives and False Negatives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149216[]' id='answer-id-607333' class='answer   answerof-149216 ' value='607333'   \/><label for='answer-id-607333' id='answer-label-607333' class=' answer'><span>Rise False positives Rise False Negatives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149216[]' id='answer-id-607334' class='answer   answerof-149216 ' value='607334'   \/><label for='answer-id-607334' id='answer-label-607334' class=' answer'><span>Decrease the false positives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149216[]' id='answer-id-607335' class='answer   answerof-149216 ' value='607335'   \/><label for='answer-id-607335' id='answer-label-607335' class=' answer'><span>Decrease False negatives<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-94' style=';'><div id='questionWrap-94'  class='   watupro-question-id-149217'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>94. <\/span>You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly analyze the severity of the situation. <br \/>\r<br>Which of the following is appropriate to analyze?<\/div><input type='hidden' name='question_id[]' id='qID_94' value='149217' \/><input type='hidden' id='answerType149217' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149217[]' id='answer-id-607336' class='answer   answerof-149217 ' value='607336'   \/><label for='answer-id-607336' id='answer-label-607336' class=' answer'><span>Event logs on the PC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149217[]' id='answer-id-607337' class='answer   answerof-149217 ' value='607337'   \/><label for='answer-id-607337' id='answer-label-607337' class=' answer'><span>Internet Firewall\/Proxy log<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149217[]' id='answer-id-607338' class='answer   answerof-149217 ' value='607338'   \/><label for='answer-id-607338' id='answer-label-607338' class=' answer'><span>IDS log<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149217[]' id='answer-id-607339' class='answer   answerof-149217 ' value='607339'   \/><label for='answer-id-607339' id='answer-label-607339' class=' answer'><span>Event logs on domain controller<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-95' style=';'><div id='questionWrap-95'  class='   watupro-question-id-149218'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>95. <\/span>Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?<\/div><input type='hidden' name='question_id[]' id='qID_95' value='149218' \/><input type='hidden' id='answerType149218' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149218[]' id='answer-id-607340' class='answer   answerof-149218 ' value='607340'   \/><label for='answer-id-607340' id='answer-label-607340' class=' answer'><span>123<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149218[]' id='answer-id-607341' class='answer   answerof-149218 ' value='607341'   \/><label for='answer-id-607341' id='answer-label-607341' class=' answer'><span>161<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149218[]' id='answer-id-607342' class='answer   answerof-149218 ' value='607342'   \/><label for='answer-id-607342' id='answer-label-607342' class=' answer'><span>69<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149218[]' id='answer-id-607343' class='answer   answerof-149218 ' value='607343'   \/><label for='answer-id-607343' id='answer-label-607343' class=' answer'><span>113<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-96' style=';'><div id='questionWrap-96'  class='   watupro-question-id-149219'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>96. <\/span>Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?<\/div><input type='hidden' name='question_id[]' id='qID_96' value='149219' \/><input type='hidden' id='answerType149219' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149219[]' id='answer-id-607344' class='answer   answerof-149219 ' value='607344'   \/><label for='answer-id-607344' id='answer-label-607344' class=' answer'><span>Chosen-Cipher text Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149219[]' id='answer-id-607345' class='answer   answerof-149219 ' value='607345'   \/><label for='answer-id-607345' id='answer-label-607345' class=' answer'><span>Ciphertext-only Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149219[]' id='answer-id-607346' class='answer   answerof-149219 ' value='607346'   \/><label for='answer-id-607346' id='answer-label-607346' class=' answer'><span>Timing Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-149219[]' id='answer-id-607347' class='answer   answerof-149219 ' value='607347'   \/><label for='answer-id-607347' id='answer-label-607347' class=' answer'><span>Rubber Hose Attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-97'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons4681\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"4681\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-02 17:10:25\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1777741825\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"149124:606965,606966,606967 | 149125:606968,606969,606970,606971 | 149126:606972,606973,606974,606975 | 149127:606976,606977,606978,606979 | 149128:606980,606981,606982,606983 | 149129:606984,606985,606986,606987 | 149130:606988,606989,606990,606991 | 149131:606992,606993,606994,606995 | 149132:606996,606997,606998,606999 | 149133:607000,607001,607002,607003 | 149134:607004,607005,607006,607007 | 149135:607008,607009,607010,607011 | 149136:607012,607013,607014,607015 | 149137:607016,607017,607018,607019 | 149138:607020,607021,607022,607023 | 149139:607024,607025,607026,607027 | 149140:607028,607029,607030,607031 | 149141:607032,607033,607034,607035 | 149142:607036,607037,607038,607039 | 149143:607040,607041,607042,607043 | 149144:607044,607045,607046,607047 | 149145:607048,607049,607050,607051 | 149146:607052,607053,607054,607055 | 149147:607056,607057,607058,607059 | 149148:607060,607061,607062,607063 | 149149:607064,607065,607066,607067 | 149150:607068,607069,607070,607071 | 149151:607072,607073,607074,607075 | 149152:607076,607077,607078,607079 | 149153:607080,607081,607082,607083 | 149154:607084,607085,607086,607087 | 149155:607088,607089,607090,607091 | 149156:607092,607093,607094,607095 | 149157:607096,607097,607098,607099 | 149158:607100,607101,607102,607103 | 149159:607104,607105,607106,607107 | 149160:607108,607109,607110,607111 | 149161:607112,607113,607114,607115 | 149162:607116,607117,607118,607119 | 149163:607120,607121,607122,607123 | 149164:607124,607125,607126,607127 | 149165:607128,607129,607130,607131 | 149166:607132,607133,607134,607135 | 149167:607136,607137,607138,607139 | 149168:607140,607141,607142,607143 | 149169:607144,607145,607146,607147 | 149170:607148,607149,607150,607151 | 149171:607152,607153,607154,607155 | 149172:607156,607157,607158,607159 | 149173:607160,607161,607162,607163 | 149174:607164,607165,607166,607167 | 149175:607168,607169,607170,607171 | 149176:607172,607173,607174,607175 | 149177:607176,607177,607178,607179 | 149178:607180,607181,607182,607183 | 149179:607184,607185,607186,607187 | 149180:607188,607189,607190,607191 | 149181:607192,607193,607194,607195 | 149182:607196,607197,607198,607199 | 149183:607200,607201,607202,607203 | 149184:607204,607205,607206,607207 | 149185:607208,607209,607210,607211 | 149186:607212,607213,607214,607215 | 149187:607216,607217,607218,607219 | 149188:607220,607221,607222,607223 | 149189:607224,607225,607226,607227 | 149190:607228,607229,607230,607231 | 149191:607232,607233,607234,607235 | 149192:607236,607237,607238,607239 | 149193:607240,607241,607242,607243 | 149194:607244,607245,607246,607247 | 149195:607248,607249,607250,607251 | 149196:607252,607253,607254,607255 | 149197:607256,607257,607258,607259 | 149198:607260,607261,607262,607263 | 149199:607264,607265,607266,607267 | 149200:607268,607269,607270,607271 | 149201:607272,607273,607274,607275 | 149202:607276,607277,607278,607279 | 149203:607280,607281,607282,607283 | 149204:607284,607285,607286,607287 | 149205:607288,607289,607290,607291 | 149206:607292,607293,607294,607295 | 149207:607296,607297,607298,607299 | 149208:607300,607301,607302,607303 | 149209:607304,607305,607306,607307 | 149210:607308,607309,607310,607311 | 149211:607312,607313,607314,607315 | 149212:607316,607317,607318,607319 | 149213:607320,607321,607322,607323 | 149214:607324,607325,607326,607327 | 149215:607328,607329,607330,607331 | 149216:607332,607333,607334,607335 | 149217:607336,607337,607338,607339 | 149218:607340,607341,607342,607343 | 149219:607344,607345,607346,607347\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"149124,149125,149126,149127,149128,149129,149130,149131,149132,149133,149134,149135,149136,149137,149138,149139,149140,149141,149142,149143,149144,149145,149146,149147,149148,149149,149150,149151,149152,149153,149154,149155,149156,149157,149158,149159,149160,149161,149162,149163,149164,149165,149166,149167,149168,149169,149170,149171,149172,149173,149174,149175,149176,149177,149178,149179,149180,149181,149182,149183,149184,149185,149186,149187,149188,149189,149190,149191,149192,149193,149194,149195,149196,149197,149198,149199,149200,149201,149202,149203,149204,149205,149206,149207,149208,149209,149210,149211,149212,149213,149214,149215,149216,149217,149218,149219\";\nWatuPROSettings[4681] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 4681;\t    \nWatuPRO.post_id = 15725;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.81922200 1777741825\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(4681);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10608,299],"tags":[10602,10603,10604,10606,10605,10607],"class_list":["post-15725","post","type-post","status-publish","format-standard","hentry","category-cpeh-certification","category-gaqm","tag-cpeh-001","tag-cpeh-001-dumps","tag-cpeh-001-dumps-questions","tag-cpeh-001-exam-dumps","tag-cpeh-001-exam-questions","tag-cpeh-001-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/15725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=15725"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/15725\/revisions"}],"predecessor-version":[{"id":15727,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/15725\/revisions\/15727"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=15725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=15725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=15725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}