Home
You may like this!
171.
What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all that apply.)
  • A.
    Passwords
  • B.
    Patching
  • C.
    Encryption
  • D.
    Remote wipe
  • Answer & Explanation
  • Report
Answer : [A, C, D]
Explanation :
A company should proactively set passwords and use encryption, as well as employ remote wipe on a mobile device in the event that it is lost or stolen.
Report
Name Email  
172.
A utility for auditing WordPress from Android is __________.
  • A.
    DroidSheep
  • B.
    Firesheep
  • C.
    WPScan
  • D.
    Nmap
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
WPScan is used to look for weaknesses in WordPress sites.
Report
Name Email  
173.
What utility could be used to avoid sniffing of traffic?
  • A.
    SandroProxy
  • B.
    Proxify
  • C.
    Psiphon
  • D.
    Shark
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Psiphon is essentially a VPN technology that would thwart sniffing of traffic.
Report
Name Email  
174.
Jennifer has captured the following URL: www.test.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use?
  • A.
    Shark
  • B.
    DroidSheep
  • C.
    Airmon
  • D.
    Droid
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
DroidSheep is used to perform session hijacks.
Report
Name Email  
175.
Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans?
  • A.
    Sniffing
  • B.
    SandroProxy
  • C.
    FaceNiff
  • D.
    Blind scanning
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
SandroProxy would be useful to disguise the source of a scan.
Report
Name Email