1.
QUESTION NO: 301
Which of the following reduces the effectiveness of telephone social engineering?
Correct Answer
C. Awareness training
Explanation
Awareness training reduces the effectiveness of telephone social engineering by educating individuals about the tactics and techniques used by social engineers. This training helps individuals recognize and respond appropriately to suspicious or manipulative phone calls, reducing the likelihood of falling victim to social engineering attacks. By increasing awareness and knowledge, individuals are better equipped to identify and protect against social engineering attempts, ultimately reducing their effectiveness.
2.
QUESTION NO: 302
Which of the following will execute malicious code at a pre-specified time?
Correct Answer
A. Logic Bomb
Explanation
A logic bomb is a type of malicious code that is designed to execute at a pre-specified time or when a specific condition is met. It is typically inserted into a computer system by a malicious insider, and its purpose is to cause harm or disruption to the system or its data. Once triggered, a logic bomb can delete files, corrupt data, or perform other malicious actions. Unlike a worm or a rootkit, which are designed to spread or gain unauthorized access, a logic bomb is specifically programmed to activate at a certain time or under certain conditions.
3.
QUESTION NO: 303
All of the following are weaknesses of WEP EXCEPT:
Correct Answer
A. Lack of integrity checking
Explanation
WEP (Wired Equivalent Privacy) is a security protocol used to secure wireless networks. It has several weaknesses, including the lack of integrity checking, which means that it does not verify the integrity of the data being transmitted. This weakness allows for the possibility of data tampering or modification during transmission. The other weaknesses mentioned in the options are valid weaknesses of WEP, such as the vulnerability of the initialization vector, susceptibility to replay attacks, and the use of weak keys.
4.
QUESTION NO: 304
Which of the following is LEAST likely to help reduce single points of failure?
Correct Answer
A. Mandatory vacations
Explanation
Mandatory vacations are least likely to help reduce single points of failure because they do not directly address the technical or operational aspects of a system. While they may provide some level of redundancy by ensuring that multiple employees are familiar with a particular task, they do not directly mitigate the risk of a single point of failure. On the other hand, cross training, clustered servers, and disaster recovery exercises are all measures that can help minimize the impact of a single point of failure by providing redundancy, distributing workload, and ensuring the ability to recover from failures.
5.
QUESTION NO: 305
Which of the following reduces the attack surface of an operating system?
Correct Answer
D. Disabling unused services
Explanation
Disabling unused services reduces the attack surface of an operating system because it eliminates any potential vulnerabilities that may exist within those services. By disabling services that are not needed, the system reduces the number of entry points that attackers can exploit, thereby reducing the overall attack surface. This practice helps to minimize the potential for unauthorized access and compromises to the operating system.
6.
QUESTION NO: 306
Which of the following is LEAST effective when hardening an operating system?
Correct Answer
C. Installing HIDS
Explanation
Installing a Host Intrusion Detection System (HIDS) is the least effective method for hardening an operating system. While HIDS can help detect and prevent unauthorized access and malicious activities, it is not as effective as other measures such as configuration baselines, which provide a standardized and secure configuration for the system. Limiting administrative privileges helps minimize the risk of unauthorized access and reduces the attack surface. Installing a software firewall adds an additional layer of protection by controlling network traffic. Therefore, compared to these methods, installing HIDS is the least effective in hardening an operating system.
7.
QUESTION NO: 307
Which of the following provides the MOST control when deploying patches?
Correct Answer
C. Patch management
Explanation
Patch management provides the most control when deploying patches. Patch management refers to the process of acquiring, testing, and deploying patches or updates to software systems. It allows organizations to centrally manage and control the deployment of patches across multiple devices or systems. With patch management, organizations can schedule and automate patch deployments, prioritize critical patches, and ensure that patches are applied consistently and efficiently. This level of control ensures that patches are deployed in a controlled and organized manner, reducing the risk of system vulnerabilities and improving overall security.
8.
QUESTION NO: 308
If a technician wants to know when a computer application is accessing the network, which of the following logs should be reviewed?
Correct Answer
D. Host firewall log
Explanation
The host firewall log should be reviewed if a technician wants to know when a computer application is accessing the network. The host firewall log keeps a record of all the network traffic that is allowed or blocked by the firewall on the computer. By reviewing this log, the technician can determine when and how the application is accessing the network, providing valuable information for troubleshooting or security purposes.
9.
QUESTION NO: 309
All of the following are components of IPSec EXCEPT:
Correct Answer
C. Temporal key interchange protocol.
Explanation
IPSec (Internet Protocol Security) is a protocol suite used to secure IP communications. It consists of several components, including the encapsulating security payload (ESP), Internet Key Exchange (IKE), and authentication header (AH). The temporal key interchange protocol is not a component of IPSec. It is possible that the temporal key interchange protocol is a made-up term or a distractor option in this question.
10.
QUESTION NO: 310
IPSec connection parameters are stored in which of the following?
Correct Answer
A. Security association database
Explanation
IPSec connection parameters are stored in the Security Association Database (SAD). The SAD is a database that contains all the security parameters, such as encryption algorithms, authentication methods, and key management information, for each IPSec connection. It is used by the IPSec protocol to establish and maintain secure communication between two endpoints. The SAD keeps track of the security associations, which are the rules and policies that govern the IPSec connections. By storing the IPSec connection parameters in the SAD, the system can easily retrieve and apply the necessary security settings for each connection.
11.
QUESTION NO: 311
Which of the following will provide a 128-bit hash?
Correct Answer
A. MD5
Explanation
MD5 (Message Digest Algorithm 5) is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. It is commonly used to verify data integrity by generating a unique hash value for a given input. Despite its popularity, MD5 is considered to be weak and insecure for cryptographic purposes due to its vulnerability to collision attacks. However, it can still be used for non-cryptographic purposes such as checksums and fingerprinting.
12.
QUESTION NO: 312
Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?
Correct Answer
B. Collision resistance
Explanation
Collision resistance is the ability of a hash algorithm to avoid producing the same output for two different inputs. In other words, it ensures that it is computationally infeasible to find two different inputs that result in the same hash value. This property is essential for the security of hash functions, as it prevents attackers from finding collisions and potentially exploiting vulnerabilities in systems that rely on hash functions for data integrity and authentication.
13.
QUESTION NO: 313
Which of the following should be included in a forensic toolkit?
Correct Answer
D. Digital camera
Explanation
A digital camera should be included in a forensic toolkit because it allows forensic investigators to capture high-quality photographs of crime scenes, evidence, and other relevant details. These photographs can be used as visual documentation and can provide crucial information during the investigation and in court proceedings. Additionally, digital cameras offer the advantage of easily transferring and storing images, making them an essential tool for forensic analysis.
14.
QUESTION NO: 314
Which of the following BEST describes the form used while transferring evidence?
Correct Answer
C. Chain of custody
Explanation
The form used while transferring evidence is called the chain of custody. This form is used to document the movement and handling of evidence from the time it is collected until it is presented in court. It includes details such as who collected the evidence, where it was stored, who had access to it, and any changes or transfers that occurred. The chain of custody is crucial in maintaining the integrity and admissibility of the evidence in court.
15.
QUESTION NO: 315
Which of the following is the primary incident response function of a first responder?
Correct Answer
B. To secure the scene and preserve evidence
Explanation
The primary incident response function of a first responder is to secure the scene and preserve evidence. This involves taking immediate action to ensure the safety and security of the area where the incident occurred, as well as collecting and preserving any evidence that may be relevant to the investigation. By securing the scene and preserving evidence, the first responder helps to maintain the integrity of the incident and ensure that a thorough investigation can take place.
16.
QUESTION NO: 316
Which of the following is the GREATEST problem with low humidity in a server room?
Correct Answer
A. Static electricity
Explanation
Low humidity in a server room can lead to an increase in static electricity. Static electricity can cause damage to sensitive electronic equipment, such as servers, by creating sparks that can disrupt or destroy circuitry. This can result in data loss, system failures, and potentially costly repairs or replacements. Therefore, the greatest problem with low humidity in a server room is the increased risk of static electricity and its potential impact on the equipment.
17.
QUESTION NO: 317
Which of the following protocols is used to ensure secure transmissions on port 443?
Correct Answer
A. HTTPS
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it is the protocol used to ensure secure transmissions on port 443. HTTPS uses encryption to secure the communication between a client and a server, providing confidentiality and integrity of the transmitted data. It is commonly used for secure online transactions, such as e-commerce websites, where sensitive information like credit card details needs to be protected from unauthorized access.
18.
QUESTION NO: 318
When should a technician perform disaster recovery testing?
Correct Answer
D. In accordance with the disaster recovery plan
Explanation
The correct answer is "In accordance with the disaster recovery plan". Disaster recovery testing should be performed according to the plan that has been developed and documented for the organization. This plan outlines the procedures and steps to be taken in the event of a disaster, including when and how testing should be conducted. Following the plan ensures that testing is done at the appropriate times and in the most effective way to ensure the organization's ability to recover from a disaster.
19.
QUESTION NO: 319
Which of the following is the BEST backup method to restore the entire operating system and all related software?
Correct Answer
C. Disk Image
Explanation
A disk image is the best backup method to restore the entire operating system and all related software. A disk image is a complete copy of the entire hard drive, including the operating system, software, and data. It captures the exact state of the system at the time the backup was created, allowing for a complete restoration of the system to its previous state. This method is more comprehensive and reliable compared to other backup methods like weekly, incremental, or differential backups, which may only backup specific files or changes made since the last backup.
20.
QUESTION NO: 320
How many keys are utilized in symmetric cryptography?
Correct Answer
A. One
Explanation
Symmetric cryptography uses only one key for both encryption and decryption. This key is shared between the sender and the receiver, allowing them to communicate securely by encrypting and decrypting the messages using the same key. This differs from asymmetric cryptography, which uses a pair of keys (public and private) for encryption and decryption. In symmetric cryptography, the same key is used for both operations, making it faster and more efficient for encrypting large amounts of data.
21.
QUESTION NO: 321
Which of the following terms is BEST associated with public key infrastructure (PKI)?
Correct Answer
D. Digital signatures
Explanation
Public key infrastructure (PKI) is a system that uses public key cryptography to provide secure communication and authentication. Digital signatures are a key component of PKI as they provide a way to verify the authenticity and integrity of digital documents or messages. By using a private key to sign a document, the recipient can use the corresponding public key to verify that the document has not been tampered with and that it was indeed signed by the expected sender. Therefore, digital signatures are the most closely associated term with PKI.
22.
QUESTION NO: 322
Which of the following is the LAST step to granting access to specific domain resources?
Correct Answer
B. Authorize the user
Explanation
The last step to granting access to specific domain resources is to authorize the user. Once the user has been authenticated and their identity has been verified, the next step is to determine if they have the necessary permissions and privileges to access the specific resources they are requesting. This involves checking the user's role, permissions, and any other access control mechanisms in place to ensure that the user is authorized to access the requested resources.
23.
QUESTION NO: 323
After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their next step?
Correct Answer
A. Elevate system privileges.
Explanation
After an attacker has gained remote access to a server with minimal privileges, their next step would be to elevate their system privileges. By doing so, the attacker can gain higher levels of access and control over the server, allowing them to carry out more advanced attacks and potentially gain access to sensitive information or perform malicious activities. Monitoring network traffic, capturing private keys, and beginning key recovery may be subsequent steps that the attacker takes, but elevating system privileges is the immediate priority to gain more control over the compromised server.
24.
QUESTION NO: 324
Which of the following should the technician recommend as a way to logically separate various internal networks from each other?
Correct Answer
B. VLAN
Explanation
A VLAN (Virtual Local Area Network) is a logical network that allows for the segmentation and separation of different internal networks. By creating separate VLANs, the technician can ensure that each network remains isolated and secure, while still being able to communicate with each other when necessary. This can help to prevent unauthorized access and improve network performance by reducing broadcast traffic. VLANs can be configured on network switches, and devices within the same VLAN can communicate with each other as if they were connected to the same physical network, even if they are physically located in different areas.
25.
QUESTION NO: 325
An organization has requested the ability to monitor all network traffic as it traverses their network. Which of the following should a technician implement?
Correct Answer
B. Protocol analyzer
Explanation
A protocol analyzer is a tool that allows technicians to capture and analyze network traffic. By implementing a protocol analyzer, the organization will be able to monitor all network traffic as it traverses their network. This tool will provide detailed information about the protocols being used, the source and destination of the traffic, and any potential issues or security threats. It is an effective solution for network monitoring and troubleshooting purposes.
26.
QUESTION NO: 326
A large amount of viruses have been found on numerous domain workstations. Which of the following should the technician implement?
Correct Answer
C. Centralized antivirus
Explanation
The technician should implement centralized antivirus. This solution allows for the management and monitoring of antivirus software from a central location, making it easier to deploy updates and patches to all workstations. It also provides a centralized view of virus activity, allowing for quicker detection and response to any threats. Decentralized antivirus would not be as effective as it lacks centralized management and monitoring capabilities. Host-based intrusion detection and spyware detection are important security measures but do not specifically address the issue of viruses on domain workstations.
27.
QUESTION NO: 327
Which of the following is the MOST difficult security concern to detect when contractors enter a secured facility?
Correct Answer
B. Copying sensitive information with cellular pHones
Explanation
Copying sensitive information with cellular phones is the most difficult security concern to detect when contractors enter a secured facility because it can be done discreetly and without any physical evidence. Unlike installing rogue access points or removing storage devices, copying sensitive information with cellular phones does not require any additional hardware or obvious actions. Contractors can easily use their personal phones to take pictures or record confidential information without raising suspicion. This makes it challenging for security personnel to detect and prevent this type of security breach.
28.
QUESTION NO: 328
When are port scanners generally used on systems?
Correct Answer
B. At the beginning of a vulnerability assessment
Explanation
Port scanners are generally used at the beginning of a vulnerability assessment. This is because port scanning is a method used to identify open ports on a system, which can help determine potential vulnerabilities. By conducting a port scan at the beginning of the assessment, the tester can gather information about the target system's network services and identify any potential entry points for exploitation. This information is then used to prioritize and focus on areas that require further investigation and testing.
29.
QUESTION NO: 329
The staff must be cross-trained in different functional areas so that fraud can be detected. Which of the following is this an example of?
Correct Answer
D. Job rotation
Explanation
Job rotation is the practice of moving employees between different roles or departments within an organization. This helps to prevent fraud by ensuring that no single individual has complete control over a particular area of the business. By cross-training staff in different functional areas, organizations can detect and deter fraudulent activities as employees are able to identify irregularities or suspicious behavior more easily. This also helps to foster a culture of accountability and transparency within the organization.
30.
QUESTION NO: 330
Human Resources has requested that staff members be moved to different parts of the country into new positions. Which of the following is this an example of?
Correct Answer
D. Job rotation
Explanation
Job rotation refers to the practice of moving employees to different positions or departments within an organization. This can be done for various reasons, such as providing employees with new learning opportunities, preventing burnout, or enhancing their skills and knowledge. In this case, Human Resources has requested staff members to be moved to different parts of the country into new positions, which aligns with the concept of job rotation.
31.
QUESTION NO: 331
An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?
Correct Answer
C. Privilege escalation
Explanation
This scenario describes a privilege escalation attack, where an attacker exploits a compromised user account to gain higher privileges, such as administrator access, on a system. This allows the attacker to perform unauthorized actions and potentially compromise the entire system.
32.
QUESTION NO: 332
Which of the following is used to deny authorized users access to services?
Correct Answer
A. Botnets
Explanation
Botnets are a network of compromised computers that are controlled by a malicious actor. These computers, also known as "zombies" or "bots," can be used to launch coordinated attacks on websites or services, overwhelming them with traffic and denying access to legitimate users. By utilizing the power of multiple computers, botnets can generate a significant amount of traffic, making it difficult for authorized users to access the targeted services. Therefore, botnets are used to deny authorized users access to services.
33.
QUESTION NO: 333
An administrator recommends implementing whitelisting, blacklisting, closing-open relays, and strong authentication techniques to a server administrator. Which of the following threats are being addressed?
Correct Answer
C. Spam
Explanation
The recommended measures of implementing whitelisting, blacklisting, closing-open relays, and strong authentication techniques are aimed at addressing the threat of spam. Whitelisting and blacklisting help filter out unwanted emails, while closing-open relays prevent unauthorized use of the email server. Strong authentication techniques ensure that only authorized users can access the server, reducing the risk of spam being sent from unauthorized accounts. Therefore, by implementing these measures, the server administrator can effectively mitigate the threat of spam.
34.
QUESTION NO: 334
An administrator is asked to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which of the following additional controls could be implemented?
Correct Answer
D. Mantrap
Explanation
A mantrap is an additional control that could be implemented to improve the physical security of a data center. A mantrap is a small enclosed area with two or more doors, where one door must be closed and locked before the other door can be opened. This prevents unauthorized individuals from entering the data center by only allowing one person at a time and ensuring that the doors cannot be opened simultaneously. Implementing a mantrap adds an extra layer of security to the data center, enhancing the overall physical security measures already in place.
35.
QUESTION NO: 335
In regards to physical security, which of the following BEST describes an access control system which implements a non-trusted but secure zone immediately outside of the secure zone?
Correct Answer
C. Mantrap
Explanation
A mantrap is an access control system that creates a secure zone with two or more interlocking doors. It is designed to prevent unauthorized access by allowing only one person to enter or exit at a time. This physical security measure ensures that individuals cannot bypass the secure zone by tailgating or piggybacking. The non-trusted but secure zone immediately outside of the secure zone adds an extra layer of protection by creating a buffer area where individuals must be authenticated or verified before gaining access to the secure zone.
36.
QUESTION NO: 336
A technician notices delays in mail delivery on the mail server. Which of the following tools could be used to determine the cause of the service degradation?
Correct Answer
B. Performance monitor
Explanation
Performance monitor is the correct answer because it is a tool that can be used to monitor and analyze the performance of a system, including network performance. By using performance monitor, the technician can track various performance metrics such as CPU usage, memory usage, disk activity, and network traffic. This will help the technician identify any bottlenecks or issues that may be causing the delays in mail delivery on the mail server.
37.
QUESTION NO: 337
Penetration testing should only be used once which of the following items is in place?
Correct Answer
D. Written permission
Explanation
Penetration testing involves simulating an attack on a system to identify vulnerabilities. It is a highly invasive and potentially disruptive process. Therefore, it should only be conducted with proper authorization. Written permission ensures that the organization is aware of and has approved the testing, and it helps establish clear boundaries and expectations for the testing process. Without written permission, there is a risk of unauthorized testing, which can lead to legal and security issues. Therefore, written permission is a crucial requirement before conducting penetration testing.
38.
QUESTION NO: 338
An administrator recommends that management establish a trusted third party central repository to maintain all employees private keys. Which of the following BEST describes the administrators recommendation?
Correct Answer
D. Key escrow
Explanation
The administrator's recommendation is to establish a trusted third party central repository to maintain all employees' private keys. This is known as key escrow. Key escrow involves storing encryption keys with a trusted third party in case they need to be recovered or accessed in the future. This ensures that the keys are securely stored and can be retrieved if necessary.
39.
QUESTION NO: 339
To combat transaction fraud, a bank has implemented a requirement that all bank customers enter a different, unique code to confirm every transaction. Which of the following is the MOST effective method to accomplish this?
Correct Answer
C. One-time password
Explanation
A one-time password is the most effective method to combat transaction fraud because it provides a unique code that can only be used for a single transaction. This means that even if the password is intercepted or stolen, it cannot be used again to authorize any other transactions. This adds an extra layer of security to the banking system and reduces the risk of fraudulent transactions.
40.
QUESTION NO: 340
All of the following should be identified within the penetration testing scope of work EXCEPT:
Correct Answer
A. A complete list of all network vulnerabilities.
Explanation
The question asks for an exception to be identified within the penetration testing scope of work. The correct answer is "a complete list of all network vulnerabilities." This means that a complete list of all network vulnerabilities should not be included in the scope of work. Instead, the scope should include identifying the IP addresses of machines from which penetration testing will be executed, a list of acceptable testing techniques and tools to be utilized, and the handling of information collected by the penetration testing team.
41.
QUESTION NO: 341
Which of the following is the MOST efficient way that an administrator can restrict network access to certain ports enterprise wide?
Correct Answer
D. ACL
Explanation
An ACL (Access Control List) is the most efficient way for an administrator to restrict network access to certain ports enterprise-wide. ACLs are used to filter network traffic based on predetermined rules, allowing or denying access to specific ports or IP addresses. By implementing ACLs, the administrator can control and manage network traffic at a granular level, ensuring that only authorized users or systems have access to the desired ports while blocking unauthorized access. This helps to enhance network security and prevent potential threats or attacks.
42.
QUESTION NO: 342
An administrator is responsible for a server which has been attacked repeatedly in the past. The only recourse has been to reload the server from scratch. Which of the following techniques could be used to decrease the recovery time following an incident?
Correct Answer
B. Implement the server as a virtual server instance
Explanation
Implementing the server as a virtual server instance would decrease the recovery time following an incident. This is because a virtual server can be easily backed up and restored, allowing for quick recovery in the event of an attack. Additionally, virtual servers can be easily replicated and deployed on different physical servers, providing redundancy and minimizing downtime.
43.
QUESTION NO: 343
Validating the users claimed identity is called which of the following?
Correct Answer
A. Authentication
Explanation
Authentication is the process of verifying the claimed identity of a user. It involves confirming the user's identity through the use of credentials such as passwords, biometrics, or security tokens. This ensures that the user is who they claim to be before granting them access to a system or resource. Identification refers to the act of identifying a user, while verification is the process of confirming the accuracy of the information provided. Validation, on the other hand, typically refers to the process of checking the integrity and validity of data.
44.
QUESTION NO: 344
Which of the following is planted on an infected system and deployed at a predetermined time?
Correct Answer
A. Logic bomb
Explanation
A logic bomb is a malicious code that is planted on an infected system and is programmed to execute a specific action at a predetermined time or when certain conditions are met. Unlike a Trojan horse or a worm, which are designed to spread and infect other systems, a logic bomb remains dormant until triggered. Once triggered, it can cause damage to the system, such as deleting files, stealing data, or disrupting operations. Therefore, a logic bomb fits the description of being planted on an infected system and deployed at a predetermined time.
45.
QUESTION NO: 345
Which of the following allows a user to float a domain registration for a maximum of five days?
Correct Answer
D. Kiting
Explanation
Kiting allows a user to float a domain registration for a maximum of five days. Kiting refers to the practice of registering a domain name and then canceling the registration within the grace period, which is typically five days. This allows the user to temporarily use the domain without actually paying for it. It is a deceptive practice that takes advantage of the grace period offered by domain registrars.
46.
QUESTION NO: 346
According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?
Correct Answer
D. VLAN
Explanation
A VLAN (Virtual Local Area Network) would be the simplest way to logically separate the Human Resources department from the Accounting department. VLANs allow for the creation of separate virtual networks within a physical network infrastructure, allowing for different departments to be isolated from each other while still sharing the same physical resources. This would ensure that the two departments remain separate and their network traffic does not mix, in accordance with the company policy.
47.
QUESTION NO: 347
Which of the following is an attack which is launched from multiple zombie machines in attempt to bring down a service?
Correct Answer
C. DDoS
Explanation
A DDoS (Distributed Denial of Service) attack is launched from multiple zombie machines, which are compromised computers or devices controlled by an attacker. The goal of a DDoS attack is to overwhelm a targeted service or website with a flood of traffic, making it unavailable to legitimate users. This attack is different from a DoS (Denial of Service) attack, which is launched from a single source, as it utilizes multiple sources to amplify the impact and make it harder to defend against. A DDoS attack can cause significant disruption and financial loss for the targeted organization.
48.
QUESTION NO: 348
Which of the following will MOST likely allow an attacker to make a switch function like a hub?
Correct Answer
A. MAC flooding
Explanation
MAC flooding is a technique in which an attacker floods a switch with fake MAC addresses, causing the switch to enter into a fail-open mode and behave like a hub. This allows the attacker to intercept and view all network traffic passing through the switch, compromising the security of the network. ARP poisoning, DNS poisoning, and DNS spoofing are all different attack techniques that can be used to manipulate network traffic, but they do not specifically cause a switch to function like a hub.
49.
QUESTION NO: 349
Which of the following is commonly programmed into an application for ease of administration?
Correct Answer
A. Back door
Explanation
A back door is commonly programmed into an application for ease of administration. It allows authorized individuals to bypass normal authentication processes and gain access to the system or application. This can be useful for system administrators or developers who need to troubleshoot or make changes without going through the usual authentication steps. However, back doors can also be exploited by unauthorized individuals, making them a potential security risk if not properly managed and secured.
50.
QUESTION NO: 350
Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?
Correct Answer
C. War chalking
Explanation
War chalking is a technique used by hackers to identify unsecured wireless network locations to other hackers. It involves marking or drawing symbols on public spaces, such as walls or pavements, to indicate the presence of an unsecured Wi-Fi network. These symbols serve as a signal to other hackers that the network is vulnerable and can be easily exploited. By using war chalking, hackers can quickly identify and target unsecured networks for unauthorized access or malicious activities.