00:00

QUESTION 116

- (Topic 8)
Melissa is a virus that attacks Microsoft Windows platforms. To which category does this virus belong?

Correct Answer: D
The Melissa macro virus propagates in the form of an email message containing an infected Word document as an attachment.

QUESTION 117

- (Topic 2)
Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to secure data from specific threats, but it does not secure the application from coding errors. It can provide data privacy; integrity and enable strong authentication but it cannot mitigate programming errors. What is a good example of a programming error that Bob can use to explain to the management how encryption will not address all their security concerns?

Correct Answer: A

QUESTION 118

- (Topic 5)
A newly discovered flaw in a software application would be considered which kind of security vulnerability?

Correct Answer: C

QUESTION 119

- (Topic 3)
On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?

Correct Answer: C

QUESTION 120

- (Topic 7)
ARP poisoning is achieved in steps

Correct Answer: B
The hacker begins by sending a malicious ARP "reply" (for which there was no previous request) to your router, associating his computer's MAC address with your IP Address. Now your router thinks the hacker's computer is your computer. Next, the hacker sends a malicious ARP reply to your computer, associating his MAC Address with the routers IP Address. Now your machine thinks the hacker's computer is your router. The hacker has now used ARP poisoning to accomplish a MitM attack.