GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Which of the following is true regarding n-tier architecture…

Which of the following is true regarding n-tier architecture?

Read Details

Examining a database server during routine maintenance, you…

Examining a database server during routine maintenance, you discover an hour of time missing from the log file, during what would otherwise be normal operating hours. Further investigation reveals no user complaints on accessibility. Which of the following is the most likely explanation?

Read Details

A WPA2 wireless network is discovered during a pen test. Whi…

A WPA2 wireless network is discovered during a pen test. Which of the following methods is the best way to crack the network key?

Read Details

When an attack by a hacker is politically motivated, the hac…

When an attack by a hacker is politically motivated, the hacker is said to be participating in which of the following?

Read Details

Which of the following can migrate the machine’s actual oper…

Which of the following can migrate the machine’s actual operating system into a virtual machine?

Read Details

Which of the following are appropriate active sniffing techn…

Which of the following are appropriate active sniffing techniques against a switched network? (Choose all that apply)

Read Details

Elements of security include confidentiality, integrity, and…

Elements of security include confidentiality, integrity, and availability. Which technique provides for integrity?

Read Details

Your company has a document that spells out exactly what emp…

Your company has a document that spells out exactly what employees are allowed to do on their computer systems. It also defines what is prohibited and what consequences await those who break the rules. A copy of this document is signed by all employees prior to their network access. Which of the following best describes this policy?

Read Details

Which of the following statements is true regarding port sca…

Which of the following statements is true regarding port scanning:

Read Details

While pen-testing a client, you discover LM hashing, with no…

While pen-testing a client, you discover LM hashing, with no salting, is still while for backward compatibility on most systems. One stolen password hash reads 9FAF6B755DC38E12AAD3B435B51404EE. Is this user following good password procedures?

Read Details

Posts pagination

Newer posts 1 … 44,105 44,106 44,107 44,108 44,109 … 81,159 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top