1.
Which of the following is an example of two factor authentication?
2.
A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?
3.
A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:89
4.
What is the outcome of the comm"nc -l -p 2222 | nc 10.1.0.43 1234"?
5.
For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
6.
Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?
7.
When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
8.
How does an operating system protect the passwords used for account logins?
9.
Which of the following programs is usually targeted at Microsoft Office products?
10.
What is the main difference between a "Normal" SQL Injection and a "Blind" SQL Injection vulnerability?