PDF Download
FREE AND STUDY GAMES ABOUT PT 10 EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -36 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)
- Password complexity
- Password history
- Password length
- Password lockout
- Password expiration
Answer:
- Password complexity
- Password history
Question 2: What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings?
- ifconfig
- netstat
- nslookup
- ipconfig
Answer:
- ifconfig
Question 3: Which of the following are hashing algorithms?
(Select all that apply)
A. MD5
B. RIPEMD
- Bcrypt
D. HMAC
E. SHA
Answer:
A. MD5
B. RIPEMD
D. HMAC
E. SHA
Question 4: SMTP
Answer:
25
Question 5: Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version?
A. KPA
B. POODLE
C. KEK
D. CSRF
Answer:
A. KPA
Question 6: FTP
Answer:
20,21 Question 7: Which of the following terms describes an attempt to read a variable that stores a null value?
- Integer overflow
- Pointer dereference
- Buffer overflow
- Memory leak
Answer:
- Pointer dereference
- Fuzz testing
- Shimming
- Sideloading
Question 8: Which of the terms listed below refer(s) to software/hardware driver manipulation technique(s) that might be used to enable malware injection?(Select all that apply)
- Sandboxing
- Refactoring
Answer:
- Shimming
- Refactoring
Question 9: TACACS
Answer:
49 Question 10: A situation in which an application writes to or reads from an area of memory that
it is not supposed to access is referred to as:
- DLL injection
- Buffer overflow
- Memory leak
- Integer overflow
Answer:
- Buffer overflow
Question 11: SCP
Answer:
22 Question 12: A digital certificate which allows multiple domains to be protected by a single
certificate is known as:
- Extended Validation (EV) certificate
- Wildcard certificate
- Subject Alternative Name (SAN) certificate