ANSWERS 100% SOLVED
Which of the following is a penetration testing framework?
A. TKIP
B. HIPAA
C. RFC 1087
D. NIST 800-53 - ANSWERD. NIST 800-53
Which of the following is a corporate governance law that affects public corporations'
financial reporting?
A. SOX
B. HIPAA
C. FISMA
D. NIST 800-53 - ANSWERA. SOX
If an active fax machine is discovered during an assessment, which of the following is of
the least concern?
A. The phone number is publicly available.
B. The fax machine is in an open, unsecured area.
C. Faxes frequently sit in the printer tray.
D. The fax machine uses a ribbon. - ANSWERA. The phone number is publicly
available.
Which of the following terms best describes hackers that occupy the lowest level of the
hacker hierarchy?
, A. White-hat hackers
B. Gray-hat hackers
C. Black-hat hackers
D. Script kiddies - ANSWERD. Script kiddies
In which of the following phases does an attacker passively acquire information about
the intended victim's systems?
A. Scanning
B. Enumeration
C. Footprinting
D. Escalation of privilege - ANSWERC. Footprinting
Which of the following describes penetration testing as a four-step process?
A. HIPAA
B. NIST 800-42
C. FISMA
D. NIST 800-37 - ANSWERB. NIST 800-42
Which of the following statements is most accurate in regard to successful security
professionals?
A. Once certified, they are current for as long as they practice
B. They must have at minimum a masters level college degree
C. They commit to lifelong learning
D. They only need to know general terms of technology - ANSWERC. They commit to
lifelong learning
Which of the following best describes the act of gathering material that has been
discarded or left in unsecured or unguarded receptacles?
A. Eavesdropping