00:00

QUESTION 21

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to
sensitive information about the company clients. You have rummaged through their trash and found very little information.
You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

Correct Answer: B

QUESTION 22

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

Correct Answer: C

QUESTION 23

Which of the following are the default ports used by NetBIOS service?

Correct Answer: A

QUESTION 24

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?

Correct Answer: B

QUESTION 25

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate.
He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.
Which firewall would be most appropriate for Harold?

Correct Answer: A