1. Right Answer: B
Explanation: Useful and actionable results are most likely to be provided with full scan because more tests are included in it. In the scenario there is no requirement that Gary should avoid detection so it is not necessary to perform a stealth scan. It would not be appropriate for Gary to have access to scans conducted on the internal network as it is a black box test.
2. Right Answer: D
Explanation: Snort is an intrusion detection system while, QualysGuard, Nessus, and OpenVAS are all examples of vulnerability scanning tools.
3. Right Answer: C
Explanation: Government agencies conduct vulnerability scans that are according to The Federal Information Security Management Act (FISMA). Neither HIPAA governing hospitals and doctors- offices include a vulnerability scanning requirement nor does GLBA, which covers financial institutions.
4. Right Answer: D
Explanation: All of these protocols are supported by network. When a network uses Network Address Translation (NAT) to map public and private IP addresses, it results in the occurrence of internal IP disclosure vulnerabilities but a server inadvertently discloses its private IP address to remote systems.
5. Right Answer: B
Explanation: When an attacker manipulates a program into placing more data, the Buffer Overflow attack occurs. This data is placed into an area of memory than is allocated for that program-s use. Other information in memory with instructions is written specifically, which may be executed by a different process running on the system.