1.
While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?
2.
Which of the following business challenges could be solved by using a vulnerability scanner?
3.
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
4.
If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?
5.
A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?
6.
Which system consists of a publicly available set of databases that contain domain name registration contact information?
7.
A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database. In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?
8.
Which set of access control solutions implements two-factor authentication?
9.
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
10.
Advanced encryption standard is an algorithm used for which of the following?