00:00

QUESTION 1

Which among the following information is not furnished by the Rules of Engagement (ROE) document?

Correct Answer: A

QUESTION 2

Which of the following is NOT related to the Internal Security Assessment penetration testing strategy?

Correct Answer: B

QUESTION 3

Which of the following is not the SQL injection attack character?

Correct Answer: A

QUESTION 4

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

Correct Answer: D

QUESTION 5

The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram.
IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination, identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.
ECSAv10 dumps exhibit
The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram. This value is a:

Correct Answer: C