- (Exam Topic 6)
Which of the following BEST describes the mechanism of a Boot Sector Virus?
Correct Answer:
A
- (Exam Topic 1)
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Correct Answer:
A
- (Exam Topic 6)
While you were gathering information as part of security assessments for one of your clients, you were able to gather data that show your client is involved with fraudulent activities. What should you do?
Correct Answer:
A
- (Exam Topic 3)
Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network’s IDS?
Correct Answer:
A
- (Exam Topic 4)
It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.
Which of the following terms best matches the definition?
Correct Answer:
A
A threat is at any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
References: https://en.wikipedia.org/wiki/Threat_(computer)