1. Which of the following types of keys is found in a key escrow?
A) Shared B) Public C) Private D) Session
2. Which of the following is the proper way to quantify the total monetary damage resulting from an exploited vulnerability?
A) Calculate the ALE B) Calculate the MTBF C) Calculate the ARO D) Calculate the TCO
3. While performing surveillance activities,an attacker determines that an organization is using 802.1X to secure LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the identified network security?
A) ARP poisoning B) Pharming C) MAC spoofing D) Xmas attack
4. Which of the following methods is used by internal security teams to assess the security of internally developed applications?
A) Pivoting B) Active reconnaissance C) Persistence D) White box testing
5. While performing a penetration test,the technicians want their efforts to go unnoticed for as long as possible while they gather useful data about the network they are assessing. Which of the following would be the BEST choice for the technicians?
A) Packet sniffer B) Vulnerability scanner C) Offline password cracker D) Banner grabbing
1. Right Answer: C Explanation: https://www.professormesser.com/security-plus/sy0-401/key-escrow-3/
Leave a comment