1.
When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it. What should you do?
2.
The "Gray-box testing" methodology enforces what kind of restriction?
3.
You have just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk. What is one of the first things you should do when given the job?
4.
The purpose of a _______is to deny network access to local area networks and other information assets by unauthorized wireless devices.
5.
What does the
6.
During an Xmas scan, what indicates a port is closed?
7.
Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics: -Verifies success or failure of an attack
8.
Which of the following parameters describe LM Hash: I
9.
Which of the following is not a Bluetooth attack?
10.
The Open Web Application Security Project (OWASP) is the worldwide not-for-profit charitable organization focused on improving the security of software. What item is the primary concern on OWASP's Top Ten Project Most Critical Web Application Security Risks?