Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?
Steve, a network engineer, was tasked with troubleshooting a network issue that is causing unexpected packet drops. For this purpose, he employed a network troubleshooting utility to capture the ICMP echo request packets sent to the server. He identified that certain packets are dropped at the gateway due to poor network connection.
Identify the network troubleshooting utility employed by Steve in the above scenario.
A software company has implemented a wireless technology to track the employees' attendance by recording their in and out timings. Each employee in the company will have an entry card that is embedded with a tag. Whenever an employee enters the office premises, he/she is required to swipe the card at the entrance. The wirelesstechnology uses radio-frequency electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects.
Which of the following technologies has the software company implemented in the above scenario?
In an advancedcybersecurity research lab. a team Is working on developing a new cryptographicprotocol to secure highly sensitive communication. Their goal is to create aprotocol that is resilient against quantum computing attacks, which couldpotentially break many current encryption methods. During their research, theyfocus on the use of hash functions in their protocol. The team experiments withvarious hash functions to ensure the highest level of security. Considering thethreat of quantum computing, which of the following hash functions would be themost appropriate choice fortheir protocol?
Stella purchased a smartwatch online using her debit card. After making payment for the product through the
payment gateway, she received a transaction text message with a deducted and available balance from her
bank.
Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario.
RevoMedia, a digital marketing agency, often conducts client presentations off-site. The agency’s team uses mobile devices to connect to various networks and display content. Withthe rising threat landscape, it wants to adopt the most secure method for connecting its mobile devices to unfamiliar networks. Which of the following should RevoMedia adopt?
NexaBank, a prestigious banking institution, houses its primary data center in Houston, Texas. The data center is essential as It holds sensitive customer Information and processes millions of transactions daily. The bank, while confident about its cybersecurity measures, has concerns regarding the physical threats given Houston's susceptibility to natural disasters, especially hurricanes. The management understands that a natural disaster could disrupt services or, worse, compromise customer data. The bank Is now weighing options to enhance its physical security controls to account for such external threats.
For NexaBank's data center In Houston, which is the most critical physical security control it should consider implementing?
Perform vulnerability analysis of a web application, www.luxurytreats.com. and determine the name of the alert with WASC ID 9. (Practical Question)
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ECCouncil Free Exams |
---|
![]() |