{"id":96238,"date":"2025-01-18T02:24:46","date_gmt":"2025-01-18T02:24:46","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=96238"},"modified":"2025-01-18T02:24:46","modified_gmt":"2025-01-18T02:24:46","slug":"new-ec-council-ceh-312-50v13-dumps-v8-02-prepare-for-the-certified-ethical-hacker-ceh-v13-exam-with-the-latest-and-updated-312-50v13-exam-questions","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/new-ec-council-ceh-312-50v13-dumps-v8-02-prepare-for-the-certified-ethical-hacker-ceh-v13-exam-with-the-latest-and-updated-312-50v13-exam-questions.html","title":{"rendered":"New EC-Council CEH 312-50v13 Dumps (V8.02) &#8211; Prepare for the Certified Ethical Hacker (CEH) v13 Exam with the Latest and Updated 312-50v13 Exam Questions"},"content":{"rendered":"<p><a href=\"https:\/\/www.dumpsbase.com\/312-50v13.html\"><em><strong>The Certified Ethical Hacker (CEH) certification has been upgraded to Version 13, now featuring AI capabilities<\/strong><\/em><\/a>. To earn your CEH v13 certification, you&#8217;ll need to pass the 312-50v13 exam. Success in this EC-Council exam opens doors to rewarding career opportunities in IT security. DumpsBase offers 572 practice exam questions with detailed answers to help you prepare effectively. Using our latest 312-50v13 exam questions, you can streamline your preparation and tackle this challenging certification test confidently. The most effective approach to preparing for the EC-Council CEH certification is to use these current practice questions and maintain a regular study routine. DumpsBase provides free updates for up to one year, ensuring you stay current with the latest exam content and have a clear path to certification.<\/p>\n<h2>Check EC-Council Certified Ethical Hacker (CEH) v13 <em><span style=\"background-color: #00ffff;\">312-50v13 Free Dumps<\/span><\/em><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam9409\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-9409\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-9409\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-375649'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. <br \/>\r<br>At what layer of the OSI layer does the encryption and decryption of the message take place?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='375649' \/><input type='hidden' id='answerType375649' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375649[]' id='answer-id-1462201' class='answer   answerof-375649 ' value='1462201'   \/><label for='answer-id-1462201' id='answer-label-1462201' class=' answer'><span>Application<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375649[]' id='answer-id-1462202' class='answer   answerof-375649 ' value='1462202'   \/><label for='answer-id-1462202' id='answer-label-1462202' class=' answer'><span>Transport<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375649[]' id='answer-id-1462203' class='answer   answerof-375649 ' value='1462203'   \/><label for='answer-id-1462203' id='answer-label-1462203' class=' answer'><span>Session<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375649[]' id='answer-id-1462204' class='answer   answerof-375649 ' value='1462204'   \/><label for='answer-id-1462204' id='answer-label-1462204' class=' answer'><span>Presentation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-375650'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. <br \/>\r<br>What is a possible source of this problem?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='375650' \/><input type='hidden' id='answerType375650' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375650[]' id='answer-id-1462205' class='answer   answerof-375650 ' value='1462205'   \/><label for='answer-id-1462205' id='answer-label-1462205' class=' answer'><span>The WAP does not recognize the client\u2019s MAC address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375650[]' id='answer-id-1462206' class='answer   answerof-375650 ' value='1462206'   \/><label for='answer-id-1462206' id='answer-label-1462206' class=' answer'><span>The client cannot see the SSID of the wireless network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375650[]' id='answer-id-1462207' class='answer   answerof-375650 ' value='1462207'   \/><label for='answer-id-1462207' id='answer-label-1462207' class=' answer'><span>Client is configured for the wrong channel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375650[]' id='answer-id-1462208' class='answer   answerof-375650 ' value='1462208'   \/><label for='answer-id-1462208' id='answer-label-1462208' class=' answer'><span>The wireless client is not configured to use DHCP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-375651'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>You are tasked to perform a penetration test. While you are performing information gathering, you <br \/>\r<br>find an employee list in Google. You find the receptionist\u2019s email, and you send her an email changing the source email to her boss\u2019s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don\u2019t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. <br \/>\r<br>What testing method did you use?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='375651' \/><input type='hidden' id='answerType375651' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375651[]' id='answer-id-1462209' class='answer   answerof-375651 ' value='1462209'   \/><label for='answer-id-1462209' id='answer-label-1462209' class=' answer'><span>Social engineering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375651[]' id='answer-id-1462210' class='answer   answerof-375651 ' value='1462210'   \/><label for='answer-id-1462210' id='answer-label-1462210' class=' answer'><span>Piggybacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375651[]' id='answer-id-1462211' class='answer   answerof-375651 ' value='1462211'   \/><label for='answer-id-1462211' id='answer-label-1462211' class=' answer'><span>Tailgating<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375651[]' id='answer-id-1462212' class='answer   answerof-375651 ' value='1462212'   \/><label for='answer-id-1462212' id='answer-label-1462212' class=' answer'><span>Eavesdropping<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-375652'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. <br \/>\r<br>Which other option could the tester use to get a response from a host using TCP?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='375652' \/><input type='hidden' id='answerType375652' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375652[]' id='answer-id-1462213' class='answer   answerof-375652 ' value='1462213'   \/><label for='answer-id-1462213' id='answer-label-1462213' class=' answer'><span>Traceroute<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375652[]' id='answer-id-1462214' class='answer   answerof-375652 ' value='1462214'   \/><label for='answer-id-1462214' id='answer-label-1462214' class=' answer'><span>Hping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375652[]' id='answer-id-1462215' class='answer   answerof-375652 ' value='1462215'   \/><label for='answer-id-1462215' id='answer-label-1462215' class=' answer'><span>TCP ping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375652[]' id='answer-id-1462216' class='answer   answerof-375652 ' value='1462216'   \/><label for='answer-id-1462216' id='answer-label-1462216' class=' answer'><span>Broadcast ping<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-375653'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Which is the first step followed by Vulnerability Scanners for scanning a network?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='375653' \/><input type='hidden' id='answerType375653' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375653[]' id='answer-id-1462217' class='answer   answerof-375653 ' value='1462217'   \/><label for='answer-id-1462217' id='answer-label-1462217' class=' answer'><span>OS Detection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375653[]' id='answer-id-1462218' class='answer   answerof-375653 ' value='1462218'   \/><label for='answer-id-1462218' id='answer-label-1462218' class=' answer'><span>Firewall detection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375653[]' id='answer-id-1462219' class='answer   answerof-375653 ' value='1462219'   \/><label for='answer-id-1462219' id='answer-label-1462219' class=' answer'><span>TCP\/UDP Port scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375653[]' id='answer-id-1462220' class='answer   answerof-375653 ' value='1462220'   \/><label for='answer-id-1462220' id='answer-label-1462220' class=' answer'><span>Checking if the remote host is alive<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-375654'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Which of the following programs is usually targeted at Microsoft Office products?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='375654' \/><input type='hidden' id='answerType375654' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375654[]' id='answer-id-1462221' class='answer   answerof-375654 ' value='1462221'   \/><label for='answer-id-1462221' id='answer-label-1462221' class=' answer'><span>Polymorphic virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375654[]' id='answer-id-1462222' class='answer   answerof-375654 ' value='1462222'   \/><label for='answer-id-1462222' id='answer-label-1462222' class=' answer'><span>Multipart virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375654[]' id='answer-id-1462223' class='answer   answerof-375654 ' value='1462223'   \/><label for='answer-id-1462223' id='answer-label-1462223' class=' answer'><span>Macro virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375654[]' id='answer-id-1462224' class='answer   answerof-375654 ' value='1462224'   \/><label for='answer-id-1462224' id='answer-label-1462224' class=' answer'><span>Stealth virus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-375655'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0\/24. <br \/>\r<br>Which of the following has occurred?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='375655' \/><input type='hidden' id='answerType375655' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375655[]' id='answer-id-1462225' class='answer   answerof-375655 ' value='1462225'   \/><label for='answer-id-1462225' id='answer-label-1462225' class=' answer'><span>The computer is not using a private IP address.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375655[]' id='answer-id-1462226' class='answer   answerof-375655 ' value='1462226'   \/><label for='answer-id-1462226' id='answer-label-1462226' class=' answer'><span>The gateway is not routing to a public IP address.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375655[]' id='answer-id-1462227' class='answer   answerof-375655 ' value='1462227'   \/><label for='answer-id-1462227' id='answer-label-1462227' class=' answer'><span>The gateway and the computer are not on the same network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375655[]' id='answer-id-1462228' class='answer   answerof-375655 ' value='1462228'   \/><label for='answer-id-1462228' id='answer-label-1462228' class=' answer'><span>The computer is using an invalid IP address.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-375656'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='375656' \/><input type='hidden' id='answerType375656' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375656[]' id='answer-id-1462229' class='answer   answerof-375656 ' value='1462229'   \/><label for='answer-id-1462229' id='answer-label-1462229' class=' answer'><span>113<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375656[]' id='answer-id-1462230' class='answer   answerof-375656 ' value='1462230'   \/><label for='answer-id-1462230' id='answer-label-1462230' class=' answer'><span>69<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375656[]' id='answer-id-1462231' class='answer   answerof-375656 ' value='1462231'   \/><label for='answer-id-1462231' id='answer-label-1462231' class=' answer'><span>123<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375656[]' id='answer-id-1462232' class='answer   answerof-375656 ' value='1462232'   \/><label for='answer-id-1462232' id='answer-label-1462232' class=' answer'><span>161<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-375657'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='375657' \/><input type='hidden' id='answerType375657' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375657[]' id='answer-id-1462233' class='answer   answerof-375657 ' value='1462233'   \/><label for='answer-id-1462233' id='answer-label-1462233' class=' answer'><span>Nikto<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375657[]' id='answer-id-1462234' class='answer   answerof-375657 ' value='1462234'   \/><label for='answer-id-1462234' id='answer-label-1462234' class=' answer'><span>John the Ripper<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375657[]' id='answer-id-1462235' class='answer   answerof-375657 ' value='1462235'   \/><label for='answer-id-1462235' id='answer-label-1462235' class=' answer'><span>Dsniff<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375657[]' id='answer-id-1462236' class='answer   answerof-375657 ' value='1462236'   \/><label for='answer-id-1462236' id='answer-label-1462236' class=' answer'><span>Snort<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-375658'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up. <br \/>\r<br>What is the most likely cause?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='375658' \/><input type='hidden' id='answerType375658' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375658[]' id='answer-id-1462237' class='answer   answerof-375658 ' value='1462237'   \/><label for='answer-id-1462237' id='answer-label-1462237' class=' answer'><span>The network devices are not all synchronized.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375658[]' id='answer-id-1462238' class='answer   answerof-375658 ' value='1462238'   \/><label for='answer-id-1462238' id='answer-label-1462238' class=' answer'><span>Proper chain of custody was not observed while collecting the logs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375658[]' id='answer-id-1462239' class='answer   answerof-375658 ' value='1462239'   \/><label for='answer-id-1462239' id='answer-label-1462239' class=' answer'><span>The attacker altered or erased events from the logs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375658[]' id='answer-id-1462240' class='answer   answerof-375658 ' value='1462240'   \/><label for='answer-id-1462240' id='answer-label-1462240' class=' answer'><span>The security breach was a false positive.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-375659'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>During a black-box pen test you attempt to pass IRC traffic over port 80\/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. <br \/>\r<br>What type of firewall is inspecting outbound traffic?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='375659' \/><input type='hidden' id='answerType375659' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375659[]' id='answer-id-1462241' class='answer   answerof-375659 ' value='1462241'   \/><label for='answer-id-1462241' id='answer-label-1462241' class=' answer'><span>Circuit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375659[]' id='answer-id-1462242' class='answer   answerof-375659 ' value='1462242'   \/><label for='answer-id-1462242' id='answer-label-1462242' class=' answer'><span>Stateful<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375659[]' id='answer-id-1462243' class='answer   answerof-375659 ' value='1462243'   \/><label for='answer-id-1462243' id='answer-label-1462243' class=' answer'><span>Application<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375659[]' id='answer-id-1462244' class='answer   answerof-375659 ' value='1462244'   \/><label for='answer-id-1462244' id='answer-label-1462244' class=' answer'><span>Packet Filtering<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-375660'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>By using a smart card and pin, you are using a two-factor authentication that satisfies<\/div><input type='hidden' name='question_id[]' id='qID_12' value='375660' \/><input type='hidden' id='answerType375660' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375660[]' id='answer-id-1462245' class='answer   answerof-375660 ' value='1462245'   \/><label for='answer-id-1462245' id='answer-label-1462245' class=' answer'><span>Something you are and something you remember<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375660[]' id='answer-id-1462246' class='answer   answerof-375660 ' value='1462246'   \/><label for='answer-id-1462246' id='answer-label-1462246' class=' answer'><span>Something you have and something you know<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375660[]' id='answer-id-1462247' class='answer   answerof-375660 ' value='1462247'   \/><label for='answer-id-1462247' id='answer-label-1462247' class=' answer'><span>Something you know and something you are<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375660[]' id='answer-id-1462248' class='answer   answerof-375660 ' value='1462248'   \/><label for='answer-id-1462248' id='answer-label-1462248' class=' answer'><span>Something you have and something you are<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-375661'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>\u201c........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on <br \/>\r<br>the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.\u201d <br \/>\r<br>Fill in the blank with appropriate choice.<\/div><input type='hidden' name='question_id[]' id='qID_13' value='375661' \/><input type='hidden' id='answerType375661' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375661[]' id='answer-id-1462249' class='answer   answerof-375661 ' value='1462249'   \/><label for='answer-id-1462249' id='answer-label-1462249' class=' answer'><span>Evil Twin Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375661[]' id='answer-id-1462250' class='answer   answerof-375661 ' value='1462250'   \/><label for='answer-id-1462250' id='answer-label-1462250' class=' answer'><span>Sinkhole Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375661[]' id='answer-id-1462251' class='answer   answerof-375661 ' value='1462251'   \/><label for='answer-id-1462251' id='answer-label-1462251' class=' answer'><span>Collision Attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375661[]' id='answer-id-1462252' class='answer   answerof-375661 ' value='1462252'   \/><label for='answer-id-1462252' id='answer-label-1462252' class=' answer'><span>Signal Jamming Attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-375662'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='375662' \/><input type='hidden' id='answerType375662' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375662[]' id='answer-id-1462253' class='answer   answerof-375662 ' value='1462253'   \/><label for='answer-id-1462253' id='answer-label-1462253' class=' answer'><span>Residual risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375662[]' id='answer-id-1462254' class='answer   answerof-375662 ' value='1462254'   \/><label for='answer-id-1462254' id='answer-label-1462254' class=' answer'><span>Impact risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375662[]' id='answer-id-1462255' class='answer   answerof-375662 ' value='1462255'   \/><label for='answer-id-1462255' id='answer-label-1462255' class=' answer'><span>Deferred risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375662[]' id='answer-id-1462256' class='answer   answerof-375662 ' value='1462256'   \/><label for='answer-id-1462256' id='answer-label-1462256' class=' answer'><span>Inherent risk<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-375663'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. <br \/>\r<br>Which tool can be used to perform session splicing attacks?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='375663' \/><input type='hidden' id='answerType375663' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375663[]' id='answer-id-1462257' class='answer   answerof-375663 ' value='1462257'   \/><label for='answer-id-1462257' id='answer-label-1462257' class=' answer'><span>tcpsplice<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375663[]' id='answer-id-1462258' class='answer   answerof-375663 ' value='1462258'   \/><label for='answer-id-1462258' id='answer-label-1462258' class=' answer'><span>Burp<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375663[]' id='answer-id-1462259' class='answer   answerof-375663 ' value='1462259'   \/><label for='answer-id-1462259' id='answer-label-1462259' class=' answer'><span>Hydra<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375663[]' id='answer-id-1462260' class='answer   answerof-375663 ' value='1462260'   \/><label for='answer-id-1462260' id='answer-label-1462260' class=' answer'><span>Whisker<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-375664'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. <br \/>\r<br>What is the best Nmap command you will use?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='375664' \/><input type='hidden' id='answerType375664' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375664[]' id='answer-id-1462261' class='answer   answerof-375664 ' value='1462261'   \/><label for='answer-id-1462261' id='answer-label-1462261' class=' answer'><span>nmap -T4 -q 10.10.0.0\/24<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375664[]' id='answer-id-1462262' class='answer   answerof-375664 ' value='1462262'   \/><label for='answer-id-1462262' id='answer-label-1462262' class=' answer'><span>nmap -T4 -F 10.10.0.0\/24<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375664[]' id='answer-id-1462263' class='answer   answerof-375664 ' value='1462263'   \/><label for='answer-id-1462263' id='answer-label-1462263' class=' answer'><span>nmap -T4 -r 10.10.1.0\/24<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375664[]' id='answer-id-1462264' class='answer   answerof-375664 ' value='1462264'   \/><label for='answer-id-1462264' id='answer-label-1462264' class=' answer'><span>nmap -T4 -O 10.10.0.0\/24<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-375665'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Which of the following is the BEST way to defend against network sniffing?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='375665' \/><input type='hidden' id='answerType375665' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375665[]' id='answer-id-1462265' class='answer   answerof-375665 ' value='1462265'   \/><label for='answer-id-1462265' id='answer-label-1462265' class=' answer'><span>Using encryption protocols to secure network communications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375665[]' id='answer-id-1462266' class='answer   answerof-375665 ' value='1462266'   \/><label for='answer-id-1462266' id='answer-label-1462266' class=' answer'><span>Register all machines MAC Address in a Centralized Database<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375665[]' id='answer-id-1462267' class='answer   answerof-375665 ' value='1462267'   \/><label for='answer-id-1462267' id='answer-label-1462267' class=' answer'><span>Use Static IP Address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375665[]' id='answer-id-1462268' class='answer   answerof-375665 ' value='1462268'   \/><label for='answer-id-1462268' id='answer-label-1462268' class=' answer'><span>Restrict Physical Access to Server Rooms hosting Critical Servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-375666'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='375666' \/><input type='hidden' id='answerType375666' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375666[]' id='answer-id-1462269' class='answer   answerof-375666 ' value='1462269'   \/><label for='answer-id-1462269' id='answer-label-1462269' class=' answer'><span>SFTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375666[]' id='answer-id-1462270' class='answer   answerof-375666 ' value='1462270'   \/><label for='answer-id-1462270' id='answer-label-1462270' class=' answer'><span>Ipsec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375666[]' id='answer-id-1462271' class='answer   answerof-375666 ' value='1462271'   \/><label for='answer-id-1462271' id='answer-label-1462271' class=' answer'><span>SSL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375666[]' id='answer-id-1462272' class='answer   answerof-375666 ' value='1462272'   \/><label for='answer-id-1462272' id='answer-label-1462272' class=' answer'><span>FTPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-375667'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL. <br \/>\r<br>What may be the problem?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='375667' \/><input type='hidden' id='answerType375667' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375667[]' id='answer-id-1462273' class='answer   answerof-375667 ' value='1462273'   \/><label for='answer-id-1462273' id='answer-label-1462273' class=' answer'><span>Traffic is Blocked on UDP Port 53<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375667[]' id='answer-id-1462274' class='answer   answerof-375667 ' value='1462274'   \/><label for='answer-id-1462274' id='answer-label-1462274' class=' answer'><span>Traffic is Blocked on TCP Port 80<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375667[]' id='answer-id-1462275' class='answer   answerof-375667 ' value='1462275'   \/><label for='answer-id-1462275' id='answer-label-1462275' class=' answer'><span>Traffic is Blocked on TCP Port 54<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375667[]' id='answer-id-1462276' class='answer   answerof-375667 ' value='1462276'   \/><label for='answer-id-1462276' id='answer-label-1462276' class=' answer'><span>Traffic is Blocked on UDP Port 80<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-375668'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which of the following tools is used to detect wireless LANs using the 802.11a\/b\/g\/n WLAN standards on a linux platform?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='375668' \/><input type='hidden' id='answerType375668' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375668[]' id='answer-id-1462277' class='answer   answerof-375668 ' value='1462277'   \/><label for='answer-id-1462277' id='answer-label-1462277' class=' answer'><span>Kismet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375668[]' id='answer-id-1462278' class='answer   answerof-375668 ' value='1462278'   \/><label for='answer-id-1462278' id='answer-label-1462278' class=' answer'><span>Abel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375668[]' id='answer-id-1462279' class='answer   answerof-375668 ' value='1462279'   \/><label for='answer-id-1462279' id='answer-label-1462279' class=' answer'><span>Netstumbler<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375668[]' id='answer-id-1462280' class='answer   answerof-375668 ' value='1462280'   \/><label for='answer-id-1462280' id='answer-label-1462280' class=' answer'><span>Nessus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-375669'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he\/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he\/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker. <br \/>\r<br>What is the name of the attack which is mentioned in the scenario?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='375669' \/><input type='hidden' id='answerType375669' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375669[]' id='answer-id-1462281' class='answer   answerof-375669 ' value='1462281'   \/><label for='answer-id-1462281' id='answer-label-1462281' class=' answer'><span>Session Fixation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375669[]' id='answer-id-1462282' class='answer   answerof-375669 ' value='1462282'   \/><label for='answer-id-1462282' id='answer-label-1462282' class=' answer'><span>HTML Injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375669[]' id='answer-id-1462283' class='answer   answerof-375669 ' value='1462283'   \/><label for='answer-id-1462283' id='answer-label-1462283' class=' answer'><span>HTTP Parameter Pollution<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375669[]' id='answer-id-1462284' class='answer   answerof-375669 ' value='1462284'   \/><label for='answer-id-1462284' id='answer-label-1462284' class=' answer'><span>Clickjacking Attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-375670'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named &quot;nc.&quot; The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The \u201cps\u201d command shows that the \u201cnc\u201d file is running as process, and the netstat command shows the \u201cnc\u201d process is listening on a network port. <br \/>\r<br>What kind of vulnerability must be present to make this remote attack possible?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='375670' \/><input type='hidden' id='answerType375670' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375670[]' id='answer-id-1462285' class='answer   answerof-375670 ' value='1462285'   \/><label for='answer-id-1462285' id='answer-label-1462285' class=' answer'><span>File system permissions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375670[]' id='answer-id-1462286' class='answer   answerof-375670 ' value='1462286'   \/><label for='answer-id-1462286' id='answer-label-1462286' class=' answer'><span>Privilege escalation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375670[]' id='answer-id-1462287' class='answer   answerof-375670 ' value='1462287'   \/><label for='answer-id-1462287' id='answer-label-1462287' class=' answer'><span>Directory traversal<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375670[]' id='answer-id-1462288' class='answer   answerof-375670 ' value='1462288'   \/><label for='answer-id-1462288' id='answer-label-1462288' class=' answer'><span>Brute force login<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-375671'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Which method of password cracking takes the most time and effort?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='375671' \/><input type='hidden' id='answerType375671' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375671[]' id='answer-id-1462289' class='answer   answerof-375671 ' value='1462289'   \/><label for='answer-id-1462289' id='answer-label-1462289' class=' answer'><span>Dictionary attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375671[]' id='answer-id-1462290' class='answer   answerof-375671 ' value='1462290'   \/><label for='answer-id-1462290' id='answer-label-1462290' class=' answer'><span>Shoulder surfing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375671[]' id='answer-id-1462291' class='answer   answerof-375671 ' value='1462291'   \/><label for='answer-id-1462291' id='answer-label-1462291' class=' answer'><span>Rainbow tables<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375671[]' id='answer-id-1462292' class='answer   answerof-375671 ' value='1462292'   \/><label for='answer-id-1462292' id='answer-label-1462292' class=' answer'><span>Brute force<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-375672'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>What does the CoX flag do in an Nmap scan?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='375672' \/><input type='hidden' id='answerType375672' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375672[]' id='answer-id-1462293' class='answer   answerof-375672 ' value='1462293'   \/><label for='answer-id-1462293' id='answer-label-1462293' class=' answer'><span>Perform an eXpress scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375672[]' id='answer-id-1462294' class='answer   answerof-375672 ' value='1462294'   \/><label for='answer-id-1462294' id='answer-label-1462294' class=' answer'><span>Output the results in truncated format to the screen<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375672[]' id='answer-id-1462295' class='answer   answerof-375672 ' value='1462295'   \/><label for='answer-id-1462295' id='answer-label-1462295' class=' answer'><span>Output the results in XML format to a file<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375672[]' id='answer-id-1462296' class='answer   answerof-375672 ' value='1462296'   \/><label for='answer-id-1462296' id='answer-label-1462296' class=' answer'><span>Perform an Xmas scan<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-375673'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. <br \/>\r<br>What is the first step that the bank should take before enabling the audit feature?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='375673' \/><input type='hidden' id='answerType375673' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375673[]' id='answer-id-1462297' class='answer   answerof-375673 ' value='1462297'   \/><label for='answer-id-1462297' id='answer-label-1462297' class=' answer'><span>Perform a vulnerability scan of the system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375673[]' id='answer-id-1462298' class='answer   answerof-375673 ' value='1462298'   \/><label for='answer-id-1462298' id='answer-label-1462298' class=' answer'><span>Determine the impact of enabling the audit feature.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375673[]' id='answer-id-1462299' class='answer   answerof-375673 ' value='1462299'   \/><label for='answer-id-1462299' id='answer-label-1462299' class=' answer'><span>Perform a cost\/benefit analysis of the audit feature.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375673[]' id='answer-id-1462300' class='answer   answerof-375673 ' value='1462300'   \/><label for='answer-id-1462300' id='answer-label-1462300' class=' answer'><span>Allocate funds for staffing of audit log review.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-375674'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='375674' \/><input type='hidden' id='answerType375674' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375674[]' id='answer-id-1462301' class='answer   answerof-375674 ' value='1462301'   \/><label for='answer-id-1462301' id='answer-label-1462301' class=' answer'><span>Honeypots<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375674[]' id='answer-id-1462302' class='answer   answerof-375674 ' value='1462302'   \/><label for='answer-id-1462302' id='answer-label-1462302' class=' answer'><span>Firewalls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375674[]' id='answer-id-1462303' class='answer   answerof-375674 ' value='1462303'   \/><label for='answer-id-1462303' id='answer-label-1462303' class=' answer'><span>Network-based intrusion detection system (NIDS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375674[]' id='answer-id-1462304' class='answer   answerof-375674 ' value='1462304'   \/><label for='answer-id-1462304' id='answer-label-1462304' class=' answer'><span>Host-based intrusion detection system (HIDS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-375675'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>The collection of potentially actionable, overt, and publicly available information is known as<\/div><input type='hidden' name='question_id[]' id='qID_27' value='375675' \/><input type='hidden' id='answerType375675' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375675[]' id='answer-id-1462305' class='answer   answerof-375675 ' value='1462305'   \/><label for='answer-id-1462305' id='answer-label-1462305' class=' answer'><span>Open-source intelligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375675[]' id='answer-id-1462306' class='answer   answerof-375675 ' value='1462306'   \/><label for='answer-id-1462306' id='answer-label-1462306' class=' answer'><span>Real intelligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375675[]' id='answer-id-1462307' class='answer   answerof-375675 ' value='1462307'   \/><label for='answer-id-1462307' id='answer-label-1462307' class=' answer'><span>Social intelligence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375675[]' id='answer-id-1462308' class='answer   answerof-375675 ' value='1462308'   \/><label for='answer-id-1462308' id='answer-label-1462308' class=' answer'><span>Human intelligence<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-375676'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>What is one of the advantages of using both symmetric and asymmetric cryptography in SSL\/TLS?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='375676' \/><input type='hidden' id='answerType375676' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375676[]' id='answer-id-1462309' class='answer   answerof-375676 ' value='1462309'   \/><label for='answer-id-1462309' id='answer-label-1462309' class=' answer'><span>Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375676[]' id='answer-id-1462310' class='answer   answerof-375676 ' value='1462310'   \/><label for='answer-id-1462310' id='answer-label-1462310' class=' answer'><span>Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375676[]' id='answer-id-1462311' class='answer   answerof-375676 ' value='1462311'   \/><label for='answer-id-1462311' id='answer-label-1462311' class=' answer'><span>Symmetric encryption allows the server to security transmit the session keys out-of-band.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375676[]' id='answer-id-1462312' class='answer   answerof-375676 ' value='1462312'   \/><label for='answer-id-1462312' id='answer-label-1462312' class=' answer'><span>Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-375677'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10\/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). <br \/>\r<br>What is the closest approximate cost of this replacement and recovery operation per year?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='375677' \/><input type='hidden' id='answerType375677' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375677[]' id='answer-id-1462313' class='answer   answerof-375677 ' value='1462313'   \/><label for='answer-id-1462313' id='answer-label-1462313' class=' answer'><span>$1320<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375677[]' id='answer-id-1462314' class='answer   answerof-375677 ' value='1462314'   \/><label for='answer-id-1462314' id='answer-label-1462314' class=' answer'><span>$440<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375677[]' id='answer-id-1462315' class='answer   answerof-375677 ' value='1462315'   \/><label for='answer-id-1462315' id='answer-label-1462315' class=' answer'><span>$100<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375677[]' id='answer-id-1462316' class='answer   answerof-375677 ' value='1462316'   \/><label for='answer-id-1462316' id='answer-label-1462316' class=' answer'><span>$146<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-375678'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='375678' \/><input type='hidden' id='answerType375678' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375678[]' id='answer-id-1462317' class='answer   answerof-375678 ' value='1462317'   \/><label for='answer-id-1462317' id='answer-label-1462317' class=' answer'><span>Man-in-the-middle attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375678[]' id='answer-id-1462318' class='answer   answerof-375678 ' value='1462318'   \/><label for='answer-id-1462318' id='answer-label-1462318' class=' answer'><span>Meet-in-the-middle attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375678[]' id='answer-id-1462319' class='answer   answerof-375678 ' value='1462319'   \/><label for='answer-id-1462319' id='answer-label-1462319' class=' answer'><span>Replay attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375678[]' id='answer-id-1462320' class='answer   answerof-375678 ' value='1462320'   \/><label for='answer-id-1462320' id='answer-label-1462320' class=' answer'><span>Traffic analysis attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-375679'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. <br \/>\r<br>A camera captures people walking and identifies the individuals using Steve\u2019s approach. <br \/>\r<br>After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:<\/div><input type='hidden' name='question_id[]' id='qID_31' value='375679' \/><input type='hidden' id='answerType375679' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375679[]' id='answer-id-1462321' class='answer   answerof-375679 ' value='1462321'   \/><label for='answer-id-1462321' id='answer-label-1462321' class=' answer'><span>Although the approach has two phases, it actually implements just one authentication factor<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375679[]' id='answer-id-1462322' class='answer   answerof-375679 ' value='1462322'   \/><label for='answer-id-1462322' id='answer-label-1462322' class=' answer'><span>The solution implements the two authentication factors: physical object and physical characteristic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375679[]' id='answer-id-1462323' class='answer   answerof-375679 ' value='1462323'   \/><label for='answer-id-1462323' id='answer-label-1462323' class=' answer'><span>The solution will have a high level of false positives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375679[]' id='answer-id-1462324' class='answer   answerof-375679 ' value='1462324'   \/><label for='answer-id-1462324' id='answer-label-1462324' class=' answer'><span>Biological motion cannot be used to identify people<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-375680'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>What is not a PCI compliance recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='375680' \/><input type='hidden' id='answerType375680' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375680[]' id='answer-id-1462325' class='answer   answerof-375680 ' value='1462325'   \/><label for='answer-id-1462325' id='answer-label-1462325' class=' answer'><span>Use a firewall between the public network and the payment card data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375680[]' id='answer-id-1462326' class='answer   answerof-375680 ' value='1462326'   \/><label for='answer-id-1462326' id='answer-label-1462326' class=' answer'><span>Use encryption to protect all transmission of card holder data over any public network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375680[]' id='answer-id-1462327' class='answer   answerof-375680 ' value='1462327'   \/><label for='answer-id-1462327' id='answer-label-1462327' class=' answer'><span>Rotate employees handling credit card transactions on a yearly basis to different departments.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375680[]' id='answer-id-1462328' class='answer   answerof-375680 ' value='1462328'   \/><label for='answer-id-1462328' id='answer-label-1462328' class=' answer'><span>Limit access to card holder data to as few individuals as possible.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-375681'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>What is the minimum number of network connections in a multihomed firewall?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='375681' \/><input type='hidden' id='answerType375681' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375681[]' id='answer-id-1462329' class='answer   answerof-375681 ' value='1462329'   \/><label for='answer-id-1462329' id='answer-label-1462329' class=' answer'><span>3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375681[]' id='answer-id-1462330' class='answer   answerof-375681 ' value='1462330'   \/><label for='answer-id-1462330' id='answer-label-1462330' class=' answer'><span>5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375681[]' id='answer-id-1462331' class='answer   answerof-375681 ' value='1462331'   \/><label for='answer-id-1462331' id='answer-label-1462331' class=' answer'><span>4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375681[]' id='answer-id-1462332' class='answer   answerof-375681 ' value='1462332'   \/><label for='answer-id-1462332' id='answer-label-1462332' class=' answer'><span>2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-375682'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. <br \/>\r<br>Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='375682' \/><input type='hidden' id='answerType375682' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375682[]' id='answer-id-1462333' class='answer   answerof-375682 ' value='1462333'   \/><label for='answer-id-1462333' id='answer-label-1462333' class=' answer'><span>Accept the risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375682[]' id='answer-id-1462334' class='answer   answerof-375682 ' value='1462334'   \/><label for='answer-id-1462334' id='answer-label-1462334' class=' answer'><span>Introduce more controls to bring risk to 0%<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375682[]' id='answer-id-1462335' class='answer   answerof-375682 ' value='1462335'   \/><label for='answer-id-1462335' id='answer-label-1462335' class=' answer'><span>Mitigate the risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375682[]' id='answer-id-1462336' class='answer   answerof-375682 ' value='1462336'   \/><label for='answer-id-1462336' id='answer-label-1462336' class=' answer'><span>Avoid the risk<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-375683'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. <br \/>\r<br>What is the recommended architecture in terms of server placement?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='375683' \/><input type='hidden' id='answerType375683' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375683[]' id='answer-id-1462337' class='answer   answerof-375683 ' value='1462337'   \/><label for='answer-id-1462337' id='answer-label-1462337' class=' answer'><span>All three servers need to be placed internally<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375683[]' id='answer-id-1462338' class='answer   answerof-375683 ' value='1462338'   \/><label for='answer-id-1462338' id='answer-label-1462338' class=' answer'><span>A web server facing the Internet, an application server on the internal network, a database server on the internal network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375683[]' id='answer-id-1462339' class='answer   answerof-375683 ' value='1462339'   \/><label for='answer-id-1462339' id='answer-label-1462339' class=' answer'><span>A web server and the database server facing the Internet, an application server on the internal network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375683[]' id='answer-id-1462340' class='answer   answerof-375683 ' value='1462340'   \/><label for='answer-id-1462340' id='answer-label-1462340' class=' answer'><span>All three servers need to face the Internet so that they can communicate between themselves<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-375684'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. <br \/>\r<br>When users accessed any page, the applet ran and exploited many machines. <br \/>\r<br>Which one of the following tools the hacker probably used to inject HTML code?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='375684' \/><input type='hidden' id='answerType375684' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375684[]' id='answer-id-1462341' class='answer   answerof-375684 ' value='1462341'   \/><label for='answer-id-1462341' id='answer-label-1462341' class=' answer'><span>Wireshark<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375684[]' id='answer-id-1462342' class='answer   answerof-375684 ' value='1462342'   \/><label for='answer-id-1462342' id='answer-label-1462342' class=' answer'><span>Ettercap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375684[]' id='answer-id-1462343' class='answer   answerof-375684 ' value='1462343'   \/><label for='answer-id-1462343' id='answer-label-1462343' class=' answer'><span>Aircrack-ng<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375684[]' id='answer-id-1462344' class='answer   answerof-375684 ' value='1462344'   \/><label for='answer-id-1462344' id='answer-label-1462344' class=' answer'><span>Tcpdump<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-375685'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='375685' \/><input type='hidden' id='answerType375685' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375685[]' id='answer-id-1462345' class='answer   answerof-375685 ' value='1462345'   \/><label for='answer-id-1462345' id='answer-label-1462345' class=' answer'><span>ESP transport mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375685[]' id='answer-id-1462346' class='answer   answerof-375685 ' value='1462346'   \/><label for='answer-id-1462346' id='answer-label-1462346' class=' answer'><span>ESP confidential<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375685[]' id='answer-id-1462347' class='answer   answerof-375685 ' value='1462347'   \/><label for='answer-id-1462347' id='answer-label-1462347' class=' answer'><span>AH permiscuous<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375685[]' id='answer-id-1462348' class='answer   answerof-375685 ' value='1462348'   \/><label for='answer-id-1462348' id='answer-label-1462348' class=' answer'><span>AH Tunnel mode<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-375686'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. <br \/>\r<br>The time a hacker spends performing research to locate this information about a company is known as?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='375686' \/><input type='hidden' id='answerType375686' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375686[]' id='answer-id-1462349' class='answer   answerof-375686 ' value='1462349'   \/><label for='answer-id-1462349' id='answer-label-1462349' class=' answer'><span>Exploration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375686[]' id='answer-id-1462350' class='answer   answerof-375686 ' value='1462350'   \/><label for='answer-id-1462350' id='answer-label-1462350' class=' answer'><span>Investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375686[]' id='answer-id-1462351' class='answer   answerof-375686 ' value='1462351'   \/><label for='answer-id-1462351' id='answer-label-1462351' class=' answer'><span>Reconnaissance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375686[]' id='answer-id-1462352' class='answer   answerof-375686 ' value='1462352'   \/><label for='answer-id-1462352' id='answer-label-1462352' class=' answer'><span>Enumeration<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-375687'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='375687' \/><input type='hidden' id='answerType375687' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375687[]' id='answer-id-1462353' class='answer   answerof-375687 ' value='1462353'   \/><label for='answer-id-1462353' id='answer-label-1462353' class=' answer'><span>Macro virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375687[]' id='answer-id-1462354' class='answer   answerof-375687 ' value='1462354'   \/><label for='answer-id-1462354' id='answer-label-1462354' class=' answer'><span>Stealth\/Tunneling virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375687[]' id='answer-id-1462355' class='answer   answerof-375687 ' value='1462355'   \/><label for='answer-id-1462355' id='answer-label-1462355' class=' answer'><span>Cavity virus<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375687[]' id='answer-id-1462356' class='answer   answerof-375687 ' value='1462356'   \/><label for='answer-id-1462356' id='answer-label-1462356' class=' answer'><span>Polymorphic virus<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-375688'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>The \u201cGray-box testing\u201d methodology enforces what kind of restriction?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='375688' \/><input type='hidden' id='answerType375688' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375688[]' id='answer-id-1462357' class='answer   answerof-375688 ' value='1462357'   \/><label for='answer-id-1462357' id='answer-label-1462357' class=' answer'><span>Only the external operation of a system is accessible to the tester.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375688[]' id='answer-id-1462358' class='answer   answerof-375688 ' value='1462358'   \/><label for='answer-id-1462358' id='answer-label-1462358' class=' answer'><span>The internal operation of a system in only partly accessible to the tester.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375688[]' id='answer-id-1462359' class='answer   answerof-375688 ' value='1462359'   \/><label for='answer-id-1462359' id='answer-label-1462359' class=' answer'><span>Only the internal operation of a system is known to the tester.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375688[]' id='answer-id-1462360' class='answer   answerof-375688 ' value='1462360'   \/><label for='answer-id-1462360' id='answer-label-1462360' class=' answer'><span>The internal operation of a system is completely known to the tester.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-375689'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator\u2019s Computer to update the router configuration. <br \/>\r<br>What type of an alert is this?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='375689' \/><input type='hidden' id='answerType375689' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375689[]' id='answer-id-1462361' class='answer   answerof-375689 ' value='1462361'   \/><label for='answer-id-1462361' id='answer-label-1462361' class=' answer'><span>False negative<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375689[]' id='answer-id-1462362' class='answer   answerof-375689 ' value='1462362'   \/><label for='answer-id-1462362' id='answer-label-1462362' class=' answer'><span>True negative<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375689[]' id='answer-id-1462363' class='answer   answerof-375689 ' value='1462363'   \/><label for='answer-id-1462363' id='answer-label-1462363' class=' answer'><span>True positive<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375689[]' id='answer-id-1462364' class='answer   answerof-375689 ' value='1462364'   \/><label for='answer-id-1462364' id='answer-label-1462364' class=' answer'><span>False positive<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-375690'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing C Reports https:\/\/ibt1.prometric.com\/users\/custom\/report_queue\/rq_str... corporate network. <br \/>\r<br>What tool should the analyst use to perform a Blackjacking attack?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='375690' \/><input type='hidden' id='answerType375690' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375690[]' id='answer-id-1462365' class='answer   answerof-375690 ' value='1462365'   \/><label for='answer-id-1462365' id='answer-label-1462365' class=' answer'><span>Paros Proxy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375690[]' id='answer-id-1462366' class='answer   answerof-375690 ' value='1462366'   \/><label for='answer-id-1462366' id='answer-label-1462366' class=' answer'><span>BBProxy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375690[]' id='answer-id-1462367' class='answer   answerof-375690 ' value='1462367'   \/><label for='answer-id-1462367' id='answer-label-1462367' class=' answer'><span>Blooover<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375690[]' id='answer-id-1462368' class='answer   answerof-375690 ' value='1462368'   \/><label for='answer-id-1462368' id='answer-label-1462368' class=' answer'><span>BBCrack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-375691'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. <br \/>\r<br>What Nmap script will help you with this task?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='375691' \/><input type='hidden' id='answerType375691' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375691[]' id='answer-id-1462369' class='answer   answerof-375691 ' value='1462369'   \/><label for='answer-id-1462369' id='answer-label-1462369' class=' answer'><span>http-methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375691[]' id='answer-id-1462370' class='answer   answerof-375691 ' value='1462370'   \/><label for='answer-id-1462370' id='answer-label-1462370' class=' answer'><span>http enum<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375691[]' id='answer-id-1462371' class='answer   answerof-375691 ' value='1462371'   \/><label for='answer-id-1462371' id='answer-label-1462371' class=' answer'><span>http-headers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375691[]' id='answer-id-1462372' class='answer   answerof-375691 ' value='1462372'   \/><label for='answer-id-1462372' id='answer-label-1462372' class=' answer'><span>http-git<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-375692'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>Todd has been asked by the security officer to purchase a counter-based authentication system. <br \/>\r<br>Which of the following best describes this type of system?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='375692' \/><input type='hidden' id='answerType375692' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375692[]' id='answer-id-1462373' class='answer   answerof-375692 ' value='1462373'   \/><label for='answer-id-1462373' id='answer-label-1462373' class=' answer'><span>A biometric system that bases authentication decisions on behavioral attributes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375692[]' id='answer-id-1462374' class='answer   answerof-375692 ' value='1462374'   \/><label for='answer-id-1462374' id='answer-label-1462374' class=' answer'><span>A biometric system that bases authentication decisions on physical attributes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375692[]' id='answer-id-1462375' class='answer   answerof-375692 ' value='1462375'   \/><label for='answer-id-1462375' id='answer-label-1462375' class=' answer'><span>An authentication system that creates one-time passwords that are encrypted with secret keys.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375692[]' id='answer-id-1462376' class='answer   answerof-375692 ' value='1462376'   \/><label for='answer-id-1462376' id='answer-label-1462376' class=' answer'><span>An authentication system that uses passphrases that are converted into virtual passwords.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-375693'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Which of the following is a low-tech way of gaining unauthorized access to systems?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='375693' \/><input type='hidden' id='answerType375693' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375693[]' id='answer-id-1462377' class='answer   answerof-375693 ' value='1462377'   \/><label for='answer-id-1462377' id='answer-label-1462377' class=' answer'><span>Social Engineering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375693[]' id='answer-id-1462378' class='answer   answerof-375693 ' value='1462378'   \/><label for='answer-id-1462378' id='answer-label-1462378' class=' answer'><span>Eavesdropping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375693[]' id='answer-id-1462379' class='answer   answerof-375693 ' value='1462379'   \/><label for='answer-id-1462379' id='answer-label-1462379' class=' answer'><span>Scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375693[]' id='answer-id-1462380' class='answer   answerof-375693 ' value='1462380'   \/><label for='answer-id-1462380' id='answer-label-1462380' class=' answer'><span>Sniffing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-375694'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Which system consists of a publicly available set of databases that contain domain name registration contact information?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='375694' \/><input type='hidden' id='answerType375694' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375694[]' id='answer-id-1462381' class='answer   answerof-375694 ' value='1462381'   \/><label for='answer-id-1462381' id='answer-label-1462381' class=' answer'><span>WHOIS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375694[]' id='answer-id-1462382' class='answer   answerof-375694 ' value='1462382'   \/><label for='answer-id-1462382' id='answer-label-1462382' class=' answer'><span>CAPTCHA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375694[]' id='answer-id-1462383' class='answer   answerof-375694 ' value='1462383'   \/><label for='answer-id-1462383' id='answer-label-1462383' class=' answer'><span>IANA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375694[]' id='answer-id-1462384' class='answer   answerof-375694 ' value='1462384'   \/><label for='answer-id-1462384' id='answer-label-1462384' class=' answer'><span>IETF<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-375695'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Why is a penetration test considered to be more thorough than vulnerability scan?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='375695' \/><input type='hidden' id='answerType375695' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375695[]' id='answer-id-1462385' class='answer   answerof-375695 ' value='1462385'   \/><label for='answer-id-1462385' id='answer-label-1462385' class=' answer'><span>Vulnerability scans only do host discovery and port scanning by default.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375695[]' id='answer-id-1462386' class='answer   answerof-375695 ' value='1462386'   \/><label for='answer-id-1462386' id='answer-label-1462386' class=' answer'><span>A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375695[]' id='answer-id-1462387' class='answer   answerof-375695 ' value='1462387'   \/><label for='answer-id-1462387' id='answer-label-1462387' class=' answer'><span>It is not C a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375695[]' id='answer-id-1462388' class='answer   answerof-375695 ' value='1462388'   \/><label for='answer-id-1462388' id='answer-label-1462388' class=' answer'><span>The tools used by penetration testers tend to have much more comprehensive vulnerability databases.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-375696'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Bob received this text message on his mobile phone: \u201cHello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com\u201d. <br \/>\r<br>Which statement below is true?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='375696' \/><input type='hidden' id='answerType375696' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375696[]' id='answer-id-1462389' class='answer   answerof-375696 ' value='1462389'   \/><label for='answer-id-1462389' id='answer-label-1462389' class=' answer'><span>This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375696[]' id='answer-id-1462390' class='answer   answerof-375696 ' value='1462390'   \/><label for='answer-id-1462390' id='answer-label-1462390' class=' answer'><span>This is a scam because Bob does not know Scott.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375696[]' id='answer-id-1462391' class='answer   answerof-375696 ' value='1462391'   \/><label for='answer-id-1462391' id='answer-label-1462391' class=' answer'><span>Bob should write to scottmelby@yahoo.com to verify the identity of Scott.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375696[]' id='answer-id-1462392' class='answer   answerof-375696 ' value='1462392'   \/><label for='answer-id-1462392' id='answer-label-1462392' class=' answer'><span>This is probably a legitimate message as it comes from a respectable organization.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-375697'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>env x=\u2019(){ :;};echo exploit\u2019 bash Cc \u2018cat\/etc\/passwd\u2019 <br \/>\r<br>What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='375697' \/><input type='hidden' id='answerType375697' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375697[]' id='answer-id-1462393' class='answer   answerof-375697 ' value='1462393'   \/><label for='answer-id-1462393' id='answer-label-1462393' class=' answer'><span>Removes the passwd file<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375697[]' id='answer-id-1462394' class='answer   answerof-375697 ' value='1462394'   \/><label for='answer-id-1462394' id='answer-label-1462394' class=' answer'><span>Changes all passwords in passwd<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375697[]' id='answer-id-1462395' class='answer   answerof-375697 ' value='1462395'   \/><label for='answer-id-1462395' id='answer-label-1462395' class=' answer'><span>Add new user to the passwd file<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375697[]' id='answer-id-1462396' class='answer   answerof-375697 ' value='1462396'   \/><label for='answer-id-1462396' id='answer-label-1462396' class=' answer'><span>Display passwd content to prompt<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-375698'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>Which of the following is assured by the use of a hash?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='375698' \/><input type='hidden' id='answerType375698' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375698[]' id='answer-id-1462397' class='answer   answerof-375698 ' value='1462397'   \/><label for='answer-id-1462397' id='answer-label-1462397' class=' answer'><span>Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375698[]' id='answer-id-1462398' class='answer   answerof-375698 ' value='1462398'   \/><label for='answer-id-1462398' id='answer-label-1462398' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375698[]' id='answer-id-1462399' class='answer   answerof-375698 ' value='1462399'   \/><label for='answer-id-1462399' id='answer-label-1462399' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375698[]' id='answer-id-1462400' class='answer   answerof-375698 ' value='1462400'   \/><label for='answer-id-1462400' id='answer-label-1462400' class=' answer'><span>Integrity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-375699'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accounting<\/div><input type='hidden' name='question_id[]' id='qID_51' value='375699' \/><input type='hidden' id='answerType375699' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375699[]' id='answer-id-1462401' class='answer   answerof-375699 ' value='1462401'   \/><label for='answer-id-1462401' id='answer-label-1462401' class=' answer'><span>Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375699[]' id='answer-id-1462402' class='answer   answerof-375699 ' value='1462402'   \/><label for='answer-id-1462402' id='answer-label-1462402' class=' answer'><span>Results matching all words in the query.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375699[]' id='answer-id-1462403' class='answer   answerof-375699 ' value='1462403'   \/><label for='answer-id-1462403' id='answer-label-1462403' class=' answer'><span>Results for matches on target.com and Marketing.target.com that include the word \u201caccounting\u201d<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375699[]' id='answer-id-1462404' class='answer   answerof-375699 ' value='1462404'   \/><label for='answer-id-1462404' id='answer-label-1462404' class=' answer'><span>Results matching \u201caccounting\u201d in domain target.com but not on the site Marketing.target.com<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-375700'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. <br \/>\r<br>What is the name of the command used by SMTP to transmit email over TLS?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='375700' \/><input type='hidden' id='answerType375700' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375700[]' id='answer-id-1462405' class='answer   answerof-375700 ' value='1462405'   \/><label for='answer-id-1462405' id='answer-label-1462405' class=' answer'><span>OPPORTUNISTICTLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375700[]' id='answer-id-1462406' class='answer   answerof-375700 ' value='1462406'   \/><label for='answer-id-1462406' id='answer-label-1462406' class=' answer'><span>UPGRADETLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375700[]' id='answer-id-1462407' class='answer   answerof-375700 ' value='1462407'   \/><label for='answer-id-1462407' id='answer-label-1462407' class=' answer'><span>FORCETLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375700[]' id='answer-id-1462408' class='answer   answerof-375700 ' value='1462408'   \/><label for='answer-id-1462408' id='answer-label-1462408' class=' answer'><span>STARTTLS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-375701'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>In the field of cryptanalysis, what is meant by a \u201crubber-hose\u201d attack?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='375701' \/><input type='hidden' id='answerType375701' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375701[]' id='answer-id-1462409' class='answer   answerof-375701 ' value='1462409'   \/><label for='answer-id-1462409' id='answer-label-1462409' class=' answer'><span>Forcing the targeted keystream through a hardware-accelerated device such as an ASI<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375701[]' id='answer-id-1462410' class='answer   answerof-375701 ' value='1462410'   \/><label for='answer-id-1462410' id='answer-label-1462410' class=' answer'><span>A backdoor placed into a cryptographic algorithm by its creator.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375701[]' id='answer-id-1462411' class='answer   answerof-375701 ' value='1462411'   \/><label for='answer-id-1462411' id='answer-label-1462411' class=' answer'><span>Extraction of cryptographic secrets through coercion or torture.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375701[]' id='answer-id-1462412' class='answer   answerof-375701 ' value='1462412'   \/><label for='answer-id-1462412' id='answer-label-1462412' class=' answer'><span>Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-375702'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. <br \/>\r<br>What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='375702' \/><input type='hidden' id='answerType375702' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375702[]' id='answer-id-1462413' class='answer   answerof-375702 ' value='1462413'   \/><label for='answer-id-1462413' id='answer-label-1462413' class=' answer'><span>tcp.srcport= = 514 &amp;&amp; ip.src= = 192.168.0.99<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375702[]' id='answer-id-1462414' class='answer   answerof-375702 ' value='1462414'   \/><label for='answer-id-1462414' id='answer-label-1462414' class=' answer'><span>tcp.srcport= = 514 &amp;&amp; ip.src= = 192.168.150<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375702[]' id='answer-id-1462415' class='answer   answerof-375702 ' value='1462415'   \/><label for='answer-id-1462415' id='answer-label-1462415' class=' answer'><span>tcp.dstport= = 514 &amp;&amp; ip.dst= = 192.168.0.99<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375702[]' id='answer-id-1462416' class='answer   answerof-375702 ' value='1462416'   \/><label for='answer-id-1462416' id='answer-label-1462416' class=' answer'><span>tcp.dstport= = 514 &amp;&amp; ip.dst= = 192.168.0.150<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-375703'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>What two conditions must a digital signature meet?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='375703' \/><input type='hidden' id='answerType375703' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375703[]' id='answer-id-1462417' class='answer   answerof-375703 ' value='1462417'   \/><label for='answer-id-1462417' id='answer-label-1462417' class=' answer'><span>Has to be the same number of characters as a physical signature and must be unique.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375703[]' id='answer-id-1462418' class='answer   answerof-375703 ' value='1462418'   \/><label for='answer-id-1462418' id='answer-label-1462418' class=' answer'><span>Has to be unforgeable, and has to be authentic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375703[]' id='answer-id-1462419' class='answer   answerof-375703 ' value='1462419'   \/><label for='answer-id-1462419' id='answer-label-1462419' class=' answer'><span>Must be unique and have special characters.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375703[]' id='answer-id-1462420' class='answer   answerof-375703 ' value='1462420'   \/><label for='answer-id-1462420' id='answer-label-1462420' class=' answer'><span>Has to be legible and neat.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-375704'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>A company\u2019s security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. <br \/>\r<br>What sort of security breach is this policy attempting to mitigate?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='375704' \/><input type='hidden' id='answerType375704' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375704[]' id='answer-id-1462421' class='answer   answerof-375704 ' value='1462421'   \/><label for='answer-id-1462421' id='answer-label-1462421' class=' answer'><span>Attempts by attackers to access the user and password information stored in the company\u2019s SQL database.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375704[]' id='answer-id-1462422' class='answer   answerof-375704 ' value='1462422'   \/><label for='answer-id-1462422' id='answer-label-1462422' class=' answer'><span>Attempts by attackers to access Web sites that trust the Web browser user by stealing the user\u2019s authentication credentials.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375704[]' id='answer-id-1462423' class='answer   answerof-375704 ' value='1462423'   \/><label for='answer-id-1462423' id='answer-label-1462423' class=' answer'><span>Attempts by attackers to access password stored on the user\u2019s computer without the user\u2019s knowledge.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375704[]' id='answer-id-1462424' class='answer   answerof-375704 ' value='1462424'   \/><label for='answer-id-1462424' id='answer-label-1462424' class=' answer'><span>Attempts by attackers to determine the user\u2019s Web browser usage patterns, including when sites were visited and for how long.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-375705'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>What is correct about digital signatures?<\/div><input type='hidden' name='question_id[]' id='qID_57' value='375705' \/><input type='hidden' id='answerType375705' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375705[]' id='answer-id-1462425' class='answer   answerof-375705 ' value='1462425'   \/><label for='answer-id-1462425' id='answer-label-1462425' class=' answer'><span>A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375705[]' id='answer-id-1462426' class='answer   answerof-375705 ' value='1462426'   \/><label for='answer-id-1462426' id='answer-label-1462426' class=' answer'><span>Digital signatures may be used in different documents of the same type.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375705[]' id='answer-id-1462427' class='answer   answerof-375705 ' value='1462427'   \/><label for='answer-id-1462427' id='answer-label-1462427' class=' answer'><span>A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375705[]' id='answer-id-1462428' class='answer   answerof-375705 ' value='1462428'   \/><label for='answer-id-1462428' id='answer-label-1462428' class=' answer'><span>Digital signatures are issued once for each user and can be used everywhere until they expire.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-375706'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>An attacker with access to the inside network of a small company launches a successful STP manipulation attack. <br \/>\r<br>What will he do next?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='375706' \/><input type='hidden' id='answerType375706' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375706[]' id='answer-id-1462429' class='answer   answerof-375706 ' value='1462429'   \/><label for='answer-id-1462429' id='answer-label-1462429' class=' answer'><span>He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375706[]' id='answer-id-1462430' class='answer   answerof-375706 ' value='1462430'   \/><label for='answer-id-1462430' id='answer-label-1462430' class=' answer'><span>He will activate OSPF on the spoofed root bridge.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375706[]' id='answer-id-1462431' class='answer   answerof-375706 ' value='1462431'   \/><label for='answer-id-1462431' id='answer-label-1462431' class=' answer'><span>He will repeat this action so that it escalates to a DoS attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375706[]' id='answer-id-1462432' class='answer   answerof-375706 ' value='1462432'   \/><label for='answer-id-1462432' id='answer-label-1462432' class=' answer'><span>He will repeat the same attack against all L2 switches of the network.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-375707'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. <br \/>\r<br>Which Linux-based tool can change any user\u2019s password or activate disabled Windows accounts?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='375707' \/><input type='hidden' id='answerType375707' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375707[]' id='answer-id-1462433' class='answer   answerof-375707 ' value='1462433'   \/><label for='answer-id-1462433' id='answer-label-1462433' class=' answer'><span>John the Ripper<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375707[]' id='answer-id-1462434' class='answer   answerof-375707 ' value='1462434'   \/><label for='answer-id-1462434' id='answer-label-1462434' class=' answer'><span>SET<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375707[]' id='answer-id-1462435' class='answer   answerof-375707 ' value='1462435'   \/><label for='answer-id-1462435' id='answer-label-1462435' class=' answer'><span>CHNTPW<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375707[]' id='answer-id-1462436' class='answer   answerof-375707 ' value='1462436'   \/><label for='answer-id-1462436' id='answer-label-1462436' class=' answer'><span>Cain &amp; Abel<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-375708'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>What does a firewall check to prevent particular ports and applications from getting packets into an organization?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='375708' \/><input type='hidden' id='answerType375708' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375708[]' id='answer-id-1462437' class='answer   answerof-375708 ' value='1462437'   \/><label for='answer-id-1462437' id='answer-label-1462437' class=' answer'><span>Transport layer port numbers and application layer headers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375708[]' id='answer-id-1462438' class='answer   answerof-375708 ' value='1462438'   \/><label for='answer-id-1462438' id='answer-label-1462438' class=' answer'><span>Presentation layer headers and the session layer port numbers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375708[]' id='answer-id-1462439' class='answer   answerof-375708 ' value='1462439'   \/><label for='answer-id-1462439' id='answer-label-1462439' class=' answer'><span>Network layer headers and the session layer port numbers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375708[]' id='answer-id-1462440' class='answer   answerof-375708 ' value='1462440'   \/><label for='answer-id-1462440' id='answer-label-1462440' class=' answer'><span>Application layer port numbers and the transport layer headers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-375709'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to &quot;www.MyPersonalBank.com&quot;, the user is directed to a phishing site. <br \/>\r<br>Which file does the attacker need to modify?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='375709' \/><input type='hidden' id='answerType375709' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375709[]' id='answer-id-1462441' class='answer   answerof-375709 ' value='1462441'   \/><label for='answer-id-1462441' id='answer-label-1462441' class=' answer'><span>Boot.ini<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375709[]' id='answer-id-1462442' class='answer   answerof-375709 ' value='1462442'   \/><label for='answer-id-1462442' id='answer-label-1462442' class=' answer'><span>Sudoers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375709[]' id='answer-id-1462443' class='answer   answerof-375709 ' value='1462443'   \/><label for='answer-id-1462443' id='answer-label-1462443' class=' answer'><span>Networks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375709[]' id='answer-id-1462444' class='answer   answerof-375709 ' value='1462444'   \/><label for='answer-id-1462444' id='answer-label-1462444' class=' answer'><span>Hosts<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-375710'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.<\/div><input type='hidden' name='question_id[]' id='qID_62' value='375710' \/><input type='hidden' id='answerType375710' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375710[]' id='answer-id-1462445' class='answer   answerof-375710 ' value='1462445'   \/><label for='answer-id-1462445' id='answer-label-1462445' class=' answer'><span>DNSSEC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375710[]' id='answer-id-1462446' class='answer   answerof-375710 ' value='1462446'   \/><label for='answer-id-1462446' id='answer-label-1462446' class=' answer'><span>Resource records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375710[]' id='answer-id-1462447' class='answer   answerof-375710 ' value='1462447'   \/><label for='answer-id-1462447' id='answer-label-1462447' class=' answer'><span>Resource transfer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375710[]' id='answer-id-1462448' class='answer   answerof-375710 ' value='1462448'   \/><label for='answer-id-1462448' id='answer-label-1462448' class=' answer'><span>Zone transfer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-375711'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='375711' \/><input type='hidden' id='answerType375711' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375711[]' id='answer-id-1462449' class='answer   answerof-375711 ' value='1462449'   \/><label for='answer-id-1462449' id='answer-label-1462449' class=' answer'><span>Preparation phase<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375711[]' id='answer-id-1462450' class='answer   answerof-375711 ' value='1462450'   \/><label for='answer-id-1462450' id='answer-label-1462450' class=' answer'><span>Containment phase<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375711[]' id='answer-id-1462451' class='answer   answerof-375711 ' value='1462451'   \/><label for='answer-id-1462451' id='answer-label-1462451' class=' answer'><span>Identification phase<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375711[]' id='answer-id-1462452' class='answer   answerof-375711 ' value='1462452'   \/><label for='answer-id-1462452' id='answer-label-1462452' class=' answer'><span>Recovery phase<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-375712'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. <br \/>\r<br>Which of the following is being described?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='375712' \/><input type='hidden' id='answerType375712' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375712[]' id='answer-id-1462453' class='answer   answerof-375712 ' value='1462453'   \/><label for='answer-id-1462453' id='answer-label-1462453' class=' answer'><span>Multi-cast mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375712[]' id='answer-id-1462454' class='answer   answerof-375712 ' value='1462454'   \/><label for='answer-id-1462454' id='answer-label-1462454' class=' answer'><span>Promiscuous mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375712[]' id='answer-id-1462455' class='answer   answerof-375712 ' value='1462455'   \/><label for='answer-id-1462455' id='answer-label-1462455' class=' answer'><span>WEM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375712[]' id='answer-id-1462456' class='answer   answerof-375712 ' value='1462456'   \/><label for='answer-id-1462456' id='answer-label-1462456' class=' answer'><span>Port forwarding<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-375713'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. <br \/>\r<br>What is the best security policy concerning this setup?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='375713' \/><input type='hidden' id='answerType375713' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375713[]' id='answer-id-1462457' class='answer   answerof-375713 ' value='1462457'   \/><label for='answer-id-1462457' id='answer-label-1462457' class=' answer'><span>Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375713[]' id='answer-id-1462458' class='answer   answerof-375713 ' value='1462458'   \/><label for='answer-id-1462458' id='answer-label-1462458' class=' answer'><span>As long as the physical access to the network elements is restricted, there is no need for additional measures.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375713[]' id='answer-id-1462459' class='answer   answerof-375713 ' value='1462459'   \/><label for='answer-id-1462459' id='answer-label-1462459' class=' answer'><span>There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375713[]' id='answer-id-1462460' class='answer   answerof-375713 ' value='1462460'   \/><label for='answer-id-1462460' id='answer-label-1462460' class=' answer'><span>The operator knows that attacks and down time are inevitable and should have a backup site.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-375714'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>PGP, SSL, and IKE are all examples of which type of cryptography?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='375714' \/><input type='hidden' id='answerType375714' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375714[]' id='answer-id-1462461' class='answer   answerof-375714 ' value='1462461'   \/><label for='answer-id-1462461' id='answer-label-1462461' class=' answer'><span>Digest<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375714[]' id='answer-id-1462462' class='answer   answerof-375714 ' value='1462462'   \/><label for='answer-id-1462462' id='answer-label-1462462' class=' answer'><span>Secret Key<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375714[]' id='answer-id-1462463' class='answer   answerof-375714 ' value='1462463'   \/><label for='answer-id-1462463' id='answer-label-1462463' class=' answer'><span>Public Key<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375714[]' id='answer-id-1462464' class='answer   answerof-375714 ' value='1462464'   \/><label for='answer-id-1462464' id='answer-label-1462464' class=' answer'><span>Hash Algorithm<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-375715'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Peter is surfing the internet looking for information about DX Company. <br \/>\r<br>Which hacking process is Peter doing?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='375715' \/><input type='hidden' id='answerType375715' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375715[]' id='answer-id-1462465' class='answer   answerof-375715 ' value='1462465'   \/><label for='answer-id-1462465' id='answer-label-1462465' class=' answer'><span>Scanning<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375715[]' id='answer-id-1462466' class='answer   answerof-375715 ' value='1462466'   \/><label for='answer-id-1462466' id='answer-label-1462466' class=' answer'><span>Footprinting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375715[]' id='answer-id-1462467' class='answer   answerof-375715 ' value='1462467'   \/><label for='answer-id-1462467' id='answer-label-1462467' class=' answer'><span>Enumeration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-375715[]' id='answer-id-1462468' class='answer   answerof-375715 ' value='1462468'   \/><label for='answer-id-1462468' id='answer-label-1462468' class=' answer'><span>System Hacking<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-68'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons9409\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"9409\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-07 09:32:33\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778146353\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"375649:1462201,1462202,1462203,1462204 | 375650:1462205,1462206,1462207,1462208 | 375651:1462209,1462210,1462211,1462212 | 375652:1462213,1462214,1462215,1462216 | 375653:1462217,1462218,1462219,1462220 | 375654:1462221,1462222,1462223,1462224 | 375655:1462225,1462226,1462227,1462228 | 375656:1462229,1462230,1462231,1462232 | 375657:1462233,1462234,1462235,1462236 | 375658:1462237,1462238,1462239,1462240 | 375659:1462241,1462242,1462243,1462244 | 375660:1462245,1462246,1462247,1462248 | 375661:1462249,1462250,1462251,1462252 | 375662:1462253,1462254,1462255,1462256 | 375663:1462257,1462258,1462259,1462260 | 375664:1462261,1462262,1462263,1462264 | 375665:1462265,1462266,1462267,1462268 | 375666:1462269,1462270,1462271,1462272 | 375667:1462273,1462274,1462275,1462276 | 375668:1462277,1462278,1462279,1462280 | 375669:1462281,1462282,1462283,1462284 | 375670:1462285,1462286,1462287,1462288 | 375671:1462289,1462290,1462291,1462292 | 375672:1462293,1462294,1462295,1462296 | 375673:1462297,1462298,1462299,1462300 | 375674:1462301,1462302,1462303,1462304 | 375675:1462305,1462306,1462307,1462308 | 375676:1462309,1462310,1462311,1462312 | 375677:1462313,1462314,1462315,1462316 | 375678:1462317,1462318,1462319,1462320 | 375679:1462321,1462322,1462323,1462324 | 375680:1462325,1462326,1462327,1462328 | 375681:1462329,1462330,1462331,1462332 | 375682:1462333,1462334,1462335,1462336 | 375683:1462337,1462338,1462339,1462340 | 375684:1462341,1462342,1462343,1462344 | 375685:1462345,1462346,1462347,1462348 | 375686:1462349,1462350,1462351,1462352 | 375687:1462353,1462354,1462355,1462356 | 375688:1462357,1462358,1462359,1462360 | 375689:1462361,1462362,1462363,1462364 | 375690:1462365,1462366,1462367,1462368 | 375691:1462369,1462370,1462371,1462372 | 375692:1462373,1462374,1462375,1462376 | 375693:1462377,1462378,1462379,1462380 | 375694:1462381,1462382,1462383,1462384 | 375695:1462385,1462386,1462387,1462388 | 375696:1462389,1462390,1462391,1462392 | 375697:1462393,1462394,1462395,1462396 | 375698:1462397,1462398,1462399,1462400 | 375699:1462401,1462402,1462403,1462404 | 375700:1462405,1462406,1462407,1462408 | 375701:1462409,1462410,1462411,1462412 | 375702:1462413,1462414,1462415,1462416 | 375703:1462417,1462418,1462419,1462420 | 375704:1462421,1462422,1462423,1462424 | 375705:1462425,1462426,1462427,1462428 | 375706:1462429,1462430,1462431,1462432 | 375707:1462433,1462434,1462435,1462436 | 375708:1462437,1462438,1462439,1462440 | 375709:1462441,1462442,1462443,1462444 | 375710:1462445,1462446,1462447,1462448 | 375711:1462449,1462450,1462451,1462452 | 375712:1462453,1462454,1462455,1462456 | 375713:1462457,1462458,1462459,1462460 | 375714:1462461,1462462,1462463,1462464 | 375715:1462465,1462466,1462467,1462468\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"375649,375650,375651,375652,375653,375654,375655,375656,375657,375658,375659,375660,375661,375662,375663,375664,375665,375666,375667,375668,375669,375670,375671,375672,375673,375674,375675,375676,375677,375678,375679,375680,375681,375682,375683,375684,375685,375686,375687,375688,375689,375690,375691,375692,375693,375694,375695,375696,375697,375698,375699,375700,375701,375702,375703,375704,375705,375706,375707,375708,375709,375710,375711,375712,375713,375714,375715\";\nWatuPROSettings[9409] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 9409;\t    \nWatuPRO.post_id = 96238;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.32741300 1778146353\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(9409);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>The Certified Ethical Hacker (CEH) certification has been upgraded to Version 13, now featuring AI capabilities. To earn your CEH v13 certification, you&#8217;ll need to pass the 312-50v13 exam. Success in this EC-Council exam opens doors to rewarding career opportunities in IT security. DumpsBase offers 572 practice exam questions with detailed answers to help you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18264,119],"tags":[18265,18266],"class_list":["post-96238","post","type-post","status-publish","format-standard","hentry","category-ceh-v13","category-ec-council","tag-312-50v13-dumps","tag-certified-ethical-hacker-ceh-v13"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/96238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=96238"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/96238\/revisions"}],"predecessor-version":[{"id":96242,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/96238\/revisions\/96242"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=96238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=96238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=96238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}