Last Updated on October 18, 2019 by Explanation: Explanation: Explanation: An investigator finds a USB drive at a crime scene and wants to present it as evidence in court. The investigator takes the USB drive and creates a forensic image of it and takes a hash of both the original USB device and the image that was created. What is the investigator attempting to prove about the USB drive when the evidence is submitted in court?
What are three type of attacks that are preventable through the use of salting? (Choose three.)
A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?
A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?
What is the purpose of CSPRNG?
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
A recent email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent from the security office and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
A recent breach at a company was traced to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?
What are three validation criteria used for a validation rule? (Choose three.)
A user is connecting to an e-commerce server to buy some widgets for a company. The user connects to the site and notices there is no lock in the browser security status bar. The site does prompt for a username and password and the user is able to log in. What is the danger in proceeding with this transaction?
Identify three situations in which the hashing function can be applied. (Choose three.)
What is the standard for a public key infrastructure to manage digital certificates?
A user is evaluating the security infrastructure of a company and notices that some authentication systems are not using best practices when it comes to storing passwords. The user is able to crack passwords very fast and access sensitive data. The user wants to present a recommendation to the company on the proper implementation of salting to avoid password cracking techniques. What are three best practices in implementing salting? (Choose three.)
A user is the database administrator for a company. The user has been asked to implement an integrity rule that states every table must have a primary key and that the column or columns chosen to be the primary key must be unique and not null. Which integrity requirement is the user implementing?
What are three NIST-approved digital signature algorithms? (Choose three.)
Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. What could be implemented to prevent both password hashes from being the same?
What is the step by step process for creating a digital signature?
What is meant by password cracking?Definition(s):
The process of recovering secret passwords stored in a computer system or transmitted over a network.
What are the types of password attacks?Six Types of Password Attacks & How to Stop Them. Phishing. Phishing is when a hacker posing as a trustworthy party sends you a fraudulent email, hoping you will reveal your personal information voluntarily. ... . Man-in-the-Middle Attack. ... . Brute Force Attack. ... . Dictionary Attack. ... . Credential Stuffing. ... . Keyloggers.. What are the forms of password cracking techniques in Excel?What are password cracking techniques?. Brute force. This attack runs through combinations of characters of a predetermined length until it finds the combination that matches the password.. Dictionary search. ... . Phishing. ... . Malware. ... . Rainbow attack. ... . Guessing.. What type of encryption algorithm uses the same pre shared key to encrypt and decrypt data?Symmetric encryption uses the same key for encryption and decryption.
|