The safer , easier way to help you pass any IT exams.
1.A penetration testing team deploys a specifically crafted payload to a web server, which results in
opening a new session as the web server daemon. This session has full read/write access to the file
system and the admin console.
Which of the following BEST describes the attack?
2.A corporation is concerned that, if a mobile device is lost, any sensitive information on the device could
be accessed by third parties.
Which of the following would BEST prevent this from happening?
3.Ann, a security analyst, wants to implement a secure exchange of email.
Which of the following is the BEST option for Ann to implement?
4.After a security assessment was performed on the enterprise network, it was discovered that:
1. Configuration changes have been made by users without the consent of IT.
2. Network congestion has increased due to the use of social media.
3. Users are accessing file folders and network shares that are beyond the scope of their need to know.
Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)
A. Poorly trained users
B. Misconfigured WAP settings
C. Undocumented assets
D. Improperly configured accounts
E. Vulnerable business processes