Question 81

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?
  • Question 82

    Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website.
    Which of the following tools did Taylor employ in the above scenario?
  • Question 83

    In order to tailor your tests during a web-application scan, you decide to determine which web-server version is hosting the application. On using the sV flag with Nmap. you obtain the following response:
    80/tcp open http-proxy Apache Server 7.1.6
    what Information-gathering technique does this best describe?
  • Question 84

    Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them.
    Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B.
    How do you prevent DNS spoofing?
  • Question 85

    Which command can be used to show the current TCP/IP connections?