Question 101

Which of the following does proper basic configuration of snort as a network intrusion detection system require?
  • Question 102

    Your company was hired by a small healthcare provider to perform a technician assessment on the network.
    What is the best approach for discovering vulnerabilities on a Windows-based computer?
  • Question 103

    Your company was hired by a small healthcare provider to perform a technician assessment on the
    network. What is the best approach for discovering vulnerabilities on a Windows-based computer?
  • Question 104

    PGP, SSL, and IKE are all examples of which type of cryptography?
  • Question 105

    An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hacker's next step be before starting work on this job?