Question 101
Which of the following does proper basic configuration of snort as a network intrusion detection system require?
Question 102
Your company was hired by a small healthcare provider to perform a technician assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?
What is the best approach for discovering vulnerabilities on a Windows-based computer?
Question 103
Your company was hired by a small healthcare provider to perform a technician assessment on the
network. What is the best approach for discovering vulnerabilities on a Windows-based computer?
network. What is the best approach for discovering vulnerabilities on a Windows-based computer?
Question 104
PGP, SSL, and IKE are all examples of which type of cryptography?
Question 105
An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hacker's next step be before starting work on this job?
