Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
Answer and Explanation:
Find / -name "IT4983"
See what it will do is it will find the file named IT4983 in the root directory.
run this commmand with sudo just in case for permission issues.
then it will give you the location of that file we want to find.
Or
$ file /home/IT4983 ( you can type this command from whichever directory you are )
output : IT4983 , ASCII TEXT
The best answer to the question above would be option C: <span>create a bar graph that shows population totals for each nation. Since it emphasizes a visual comparison, the best way to do this is to create a bar graph. So in a bar graph, the numerical values of the variables are also presented such as the population total of each nation. In addition, the rectangular bars can easily show you the difference between each nation which makes this an ideal visual tool for comparison.</span>
Sending potentially sensitive information by email
Potentially sensitive information can be sent via Email only if the Email is encrypted
Explanation:
No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.