Question 96

When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication
"open" but sets the SSID to a 32-character string of random letters and numbers.
What is an accurate assessment of this scenario from a security perspective?
  • Question 97

    Dorian Is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?
  • Question 98

    In order to tailor your tests during a web-application scan, you decide to determine which web-server version is hosting the application. On using the sV flag with Nmap. you obtain the following response:
    80/tcp open http-proxy Apache Server 7.1.6
    what Information-gathering technique does this best describe?
  • Question 99

    Why should the security analyst disable/remove unnecessary ISAPI filters?
  • Question 100

    Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?