171.
What could a company do to protect itself from a loss of data when a phone is stolen?
(Choose all that apply.)
- A.Passwords
- B.Patching
- C.Encryption
- D.Remote wipe
- Answer & Explanation
- Report
Answer : [A, C, D]
Explanation :
Explanation :
A company should proactively set passwords and use encryption, as well as employ remote wipe on a mobile device in the event that it is lost or stolen. |
172.
A utility for auditing WordPress from Android is __________.
- A.DroidSheep
- B.Firesheep
- C.WPScan
- D.Nmap
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
WPScan is used to look for weaknesses in WordPress sites. |
173.
What utility could be used to avoid sniffing of traffic?
- A.SandroProxy
- B.Proxify
- C.Psiphon
- D.Shark
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Psiphon is essentially a VPN technology that would thwart sniffing of traffic. |
174.
Jennifer has captured the following URL: www.test.com/&w25/session=22525.
She realizes that she can perform a session hijack. Which utility would she use?
- A.Shark
- B.DroidSheep
- C.Airmon
- D.Droid
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
DroidSheep is used to perform session hijacks. |
175.
Jennifer is concerned about her scans being tracked back to her tablet. What could she
use to hide the source of the scans?
- A.Sniffing
- B.SandroProxy
- C.FaceNiff
- D.Blind scanning
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
SandroProxy would be useful to disguise the source of a scan. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40