Visitor activity

.,.,.,

Public contributions from visitors who posted under the name .,.,.,.

Questions 40
Answers 0

Recent questions

Latest questions from .,.,.,

You are the IT manager at a large corporation. One of your employees has been using a public computer to access the company's internal systems. You notice that the employee has not been following best practices for enhan...
1 answer
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use t...
1 answer
You are a cybersecurity analyst at a large corporation. One of your responsibilities is to ensure that employees are following best practices for enhancing browser privacy. You notice that one department is experiencing...
1 answer
Which EAP implementation is MOST secure? answer EAP-FAST LEAP EAP-MD5 EAP-TLS
1 answer
Which of the following attacks is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle? answer Time-of-check to time-of-use attack Buffer overflo...
1 answer
Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information? answer DLL injection Drive-by download XSS SQL injection
1 answer
Question 8 of 10 Which of the following do switches and wireless access points use to control access through a device? answer Session filtering Port number filtering IP address filtering MAC address filtering
1 answer
Question 7 of 10 Which of the following methods can be used to ensure port security by completely disabling access to a network? answer Physically removing the patch cable from the switch port Using a captive portal Impl...
1 answer
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication? answer On the wireless access point and on each wireless device On the wireless...
1 answer
You are a security analyst for a large e-commerce company. You notice that a significant number of users are complaining about unauthorized transactions on their accounts. After investigating, you suspect that the site m...
1 answer
A cybersecurity analyst is trying to discover why a web application's interpreter executes unintended commands. The analyst notices that the attack involves sending untrusted data to an interpreter as part of a command o...
1 answer
You are a security engineer at a large corporation. During a routine security audit, you discover that the company's internal application is vulnerable to Lightweight Directory Access Protocol (LDAP) Injection attacks. T...
1 answer
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access poin...
1 answer
You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from using the access point (AP) configuration utility? answer Implement MAC address filtering. Chang...
1 answer
Which of the following sends unsolicited business cards and messages to a Bluetooth device? answer Bluebugging Bluesnarfing Slamming Bluejacking
1 answer
Which of the following BEST describes bluesnarfing? answer Viewing calendar, emails, and messages on a mobile device without authorization Sending anonymous electronic business cards Cloning a mobile device Executing com...
1 answer
Which type of interference is caused by motors, heavy machinery, and fluorescent lights? answer RFI NFC EMI RFID
1 answer
Which of the following BEST describes an evil twin? answer A Bluetooth device that receives mobile phone commands via bluebugging. An access point that is added to a network by an internal employee to provide unauthorize...
1 answer
Question 6 of 10 Which type of attack is WEP extremely vulnerable to? answer Cloning IV attack Bluesnarfing Evil twin
1 answer
Which type of application vulnerability can refer to software flaws associated with the timing or order of events within a software program, which can cause undesirable or unpredictable outcomes through manipulation? ans...
1 answer
Question 2 of 10 You are a network security engineer at a large corporation. During a routine security audit, you discover that the company's internal network is vulnerable to replay attacks. The network uses a simple ch...
1 answer
You need to configure a wireless network using WPA2-Enterprise. Which of the following components should be part of your design? (Select two.) answer TKIP encryption Pre-shared keys AES encryption WEP encryption Open aut...
1 answer
A company's wireless network has been experiencing intermittent connectivity issues and slower than usual data transfer speeds. The network administrator recently updated the firmware on the wireless access point (WAP) a...
1 answer
Question 5 of 10 You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-inte...
1 answer
You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored. An attacker is able to insert database comma...
1 answer

Recent answers

Latest answers from .,.,.,

No public answers found for this visitor name.