1.
Which of the following business challenges could be solved by using a vulnerability scanner?
2.
Real 228 EC-Council EC0-350 Exam Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
3.
If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?
4.
A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?
5.
Which system consists of a publicly available set of databases that contain domain name registration contact information?
6.
A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database. In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?
7.
Which set of access control solutions implements two-factor authentication?
8.
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
9.
Advanced encryption standard is an algorithm used for which of the following?
10.
Which statement best describes a server type under an N-tier architecture?