<< Prev Question Next Question >>

Question 45/233

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.
What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (233q)
Question 1: During a recent vulnerability assessment of a major corporat...
Question 2: "........is an attack type for a rogue Wi-Fi access point th...
Question 3: As part of a college project, you have set up a web server f...
Question 4: By using a smart card and pin, you are using a two-factor au...
Question 5: Which of the following viruses tries to hide from anti-virus...
Question 6: What term describes the amount of risk that remains after th...
Question 7: This form of encryption algorithm is asymmetric key block ci...
Question 8: An ethical hacker is testing the security of a website's dat...
Question 9: jane, an ethical hacker. Is testing a target organization's ...
Question 10: Email is transmitted across the Internet using the Simple Ma...
Question 11: Firewalls are the software or hardware systems that are able...
Question 12: Study the following log extract and identify the attack. (Ex...
Question 13: Nathan is testing some of his network devices. Nathan is usi...
Question 14: Jake, a network security specialist, is trying to prevent ne...
Question 15: Switches maintain a CAM Table that maps individual MAC addre...
Question 16: John, a security analyst working for an organization, found ...
Question 17: Elliot is in the process of exploiting a web application tha...
Question 18: A hacker has successfully infected an internet-facing server...
Question 19: As a cybersecurity professional, you are responsible for sec...
Question 20: Which of the following is a component of a risk assessment?...
Question 21: A computer science student needs to fill some information in...
Question 22: Gavin owns a white-hat firm and is performing a website secu...
Question 23: Which among the following is the best example of the third s...
Question 24: Which among the following is the best example of the hacking...
Question 25: Bob wants to ensure that Alice can check whether his message...
Question 26: Which of the following is a low-tech way of gaining unauthor...
Question 27: An attacker identified that a user and an access point are b...
Question 28: Which of the following programs is usually targeted at Micro...
Question 29: You are analysing traffic on the network with Wireshark. You...
Question 30: What port number is used by LDAP protocol?...
Question 31: You are the Network Admin, and you get a complaint that some...
Question 32: Which of the following steps for risk assessment methodology...
Question 33: Jason, an attacker, targeted an organization to perform an a...
Question 34: You are a penetration tester and are about to perform a scan...
Question 35: While performing a security audit of a web application, an e...
Question 36: Richard, an attacker, aimed to hack loT devices connected to...
Question 37: Which of the following is assured by the use of a hash?...
Question 38: jane invites her friends Alice and John over for a LAN party...
Question 39: Which system consists of a publicly available set of databas...
Question 40: This kind of password cracking method uses word lists in com...
Question 41: A newly joined employee. Janet, has been allocated an existi...
Question 42: On performing a risk assessment, you need to determine the p...
Question 43: Which of the following is a command line packet analyzer sim...
Question 44: Although FTP traffic is not encrypted by default, which laye...
Question 45: Jacob works as a system administrator in an organization. He...
Question 46: Which of the following web vulnerabilities would an attacker...
Question 47: joe works as an it administrator in an organization and has ...
Question 48: What is the role of test automation in security testing?...
Question 49: Robin, a professional hacker, targeted an organization's net...
Question 50: A "Server-Side Includes" attack refers to the exploitation o...
Question 51: You're the security manager for a tech company that uses a d...
Question 52: An ethical hacker is hired to conduct a comprehensive networ...
Question 53: Samuel, a professional hacker, monitored and Intercepted alr...
Question 54: An organization has automated the operation of critical infr...
Question 55: An organization has been experiencing intrusion attempts des...
Question 56: Jack, a disgruntled ex-employee of Incalsol Ltd., decided to...
Question 57: Your organization has signed an agreement with a web hosting...
Question 58: Taylor, a security professional, uses a tool to monitor her ...
Question 59: OpenSSL on Linux servers includes a command line tool for te...
Question 60: Study the snort rule given below and interpret the rule. ale...
Question 61: A large e-commerce organization is planning to implement a v...
Question 62: You need a tool that can do network intrusion prevention and...
Question 63: You have compromised a server on a network and successfully ...
Question 64: Which of the following tools is used to analyze the files pr...
Question 65: Ethical backer jane Doe is attempting to crack the password ...
Question 66: A Certified Ethical Hacker (CEH) is given the task to perfor...
Question 67: Mason, a professional hacker, targets an organization and sp...
Question 68: Being a Certified Ethical Hacker (CEH), a company has brough...
Question 69: What is the proper response for a NULL scan if the port is o...
Question 70: A friend of yours tells you that he downloaded and executed ...
Question 71: Jane is working as a security professional at CyberSol Inc. ...
Question 72: Widespread fraud ac Enron. WorldCom, and Tyco led to the cre...
Question 73: Which of the following DoS tools is used to attack target we...
Question 74: Consider the following Nmap output: (Exhibit) what command-l...
Question 75: A technician is resolving an issue where a computer is unabl...
Question 76: This type of injection attack does not show any error messag...
Question 77: Allen, a professional pen tester, was hired by xpertTech sol...
Question 78: Which command can be used to show the current TCP/IP connect...
Question 79: Your network infrastructure is under a SYN flood attack. The...
Question 80: Which rootkit is characterized by its function of adding cod...
Question 81: Ralph, a professional hacker, targeted Jane, who had recentl...
Question 82: Security administrator John Smith has noticed abnormal amoun...
Question 83: Attempting an injection attack on a web server based on resp...
Question 84: Which of the following tools performs comprehensive tests ag...
Question 85: A sophisticated attacker targets your web server with the in...
Question 86: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 87: Windows LAN Manager (LM) hashes are known to be weak. Which ...
Question 88: Yancey is a network security administrator for a large elect...
Question 89: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 90: Scenario: Joe turns on his home computer to access personal ...
Question 91: The change of a hard drive failure is once every three years...
Question 92: In both pharming and phishing attacks, an attacker can creat...
Question 93: Calvin, a software developer, uses a feature that helps him ...
Question 94: Your company performs penetration tests and security assessm...
Question 95: David is a security professional working in an organization,...
Question 96: Peter extracts the SIDs list from Windows 2000 Server machin...
Question 97: An Intrusion Detection System (IDS) has alerted the network ...
Question 98: Kevin, a professional hacker, wants to penetrate CyberTech I...
Question 99: Sam is a penetration tester hired by Inception Tech, a secur...
Question 100: What is one of the advantages of using both symmetric and as...
Question 101: Which of the following allows attackers to draw a map or out...
Question 102: Steve, an attacker, created a fake profile on a social media...
Question 103: During the process of encryption and decryption, what keys a...
Question 104: John is an incident handler at a financial institution. His ...
Question 105: Bill has been hired as a penetration tester and cyber securi...
Question 106: Alice, a professional hacker, targeted an organization's clo...
Question 107: The following is an entry captured by a network IDS. You are...
Question 108: what is the port to block first in case you are suspicious t...
Question 109: Which access control mechanism allows for multiple systems t...
Question 110: Josh has finished scanning a network and has discovered mult...
Question 111: Null sessions are un-authenticated connections (not using a ...
Question 112: An attacker runs netcat tool to transfer a secret file betwe...
Question 113: You are a cybersecurity consultant for a global organization...
Question 114: John, a professional hacker, targeted an organization that u...
Question 115: Which of these is capable of searching for and locating rogu...
Question 116: To create a botnet. the attacker can use several techniques ...
Question 117: Boney, a professional hacker, targets an organization for fi...
Question 118: Which of the following statements is FALSE with respect to I...
Question 119: An incident investigator asks to receive a copy of the event...
Question 120: MX record priority increases as the number increases. (True/...
Question 121: Larry, a security professional in an organization, has notic...
Question 122: Which iOS jailbreaking technique patches the kernel during t...
Question 123: Peter is surfing the internet looking for information about ...
Question 124: Which of the following Google advanced search operators help...
Question 125: What would you enter if you wanted to perform a stealth scan...
Question 126: Sarah, a system administrator, was alerted of potential mali...
Question 127: To hide the file on a Linux system, you have to start the fi...
Question 128: Which type of sniffing technique is generally referred as Mi...
Question 129: You work for Acme Corporation as Sales Manager. The company ...
Question 130: What is the purpose of a demilitarized zone on a network?...
Question 131: Which tier in the N-tier application architecture is respons...
Question 132: This is an attack that takes advantage of a web site vulnera...
Question 133: Which of the following describes the characteristics of a Bo...
Question 134: Session splicing is an IDS evasion technique in which an att...
Question 135: Which of the following is the primary objective of a rootkit...
Question 136: Rebecca, a security professional, wants to authenticate empl...
Question 137: Which Metasploit Framework tool can help penetration tester ...
Question 138: Bobby, an attacker, targeted a user and decided to hijack an...
Question 139: A network admin contacts you. He is concerned that ARP spoof...
Question 140: Eve is spending her day scanning the library computers. She ...
Question 141: Which of the following tools can be used for passive OS fing...
Question 142: Thomas, a cloud security professional, is performing securit...
Question 143: What kind of detection techniques is being used in antivirus...
Question 144: A penetration tester is performing an enumeration on a clien...
Question 145: Dorian Is sending a digitally signed email to Polly, with wh...
Question 146: Lewis, a professional hacker, targeted the loT cameras and d...
Question 147: You are a Network Security Officer. You have two machines. T...
Question 148: How can rainbow tables be defeated?...
Question 149: Sam is working as a system administrator In an organization....
Question 150: During an Xmas scan what indicates a port is closed?...
Question 151: Why containers are less secure that virtual machines?...
Question 152: Which address translation scheme would allow a single public...
Question 153: Based on the following extract from the log of a compromised...
Question 154: A malicious user has acquired a Ticket Granting Service from...
Question 155: After an audit, the auditors Inform you that there is a crit...
Question 156: Peter, a system administrator working at a reputed IT firm, ...
Question 157: You are using a public Wi-Fi network inside a coffee shop. B...
Question 158: Bob, a network administrator at BigUniversity, realized that...
Question 159: You receive an e-mail like the one shown below. When you cli...
Question 160: Which of the following statements is TRUE?...
Question 161: Which of the following Bluetooth hacking techniques does an ...
Question 162: An ethical hacker is hired to evaluate the defenses of an or...
Question 163: A security analyst uses Zenmap to perform an ICMP timestamp ...
Question 164: Why should the security analyst disable/remove unnecessary I...
Question 165: A security analyst is performing an audit on the network to ...
Question 166: Which of the following are well known password-cracking prog...
Question 167: what firewall evasion scanning technique make use of a zombi...
Question 168: Miley, a professional hacker, decided to attack a target org...
Question 169: How does a denial-of-service attack work?...
Question 170: in this form of encryption algorithm, every Individual block...
Question 171: Tony is a penetration tester tasked with performing a penetr...
Question 172: An experienced cyber attacker has created a fake Linkedin pr...
Question 173: CompanyXYZ has asked you to assess the security of their per...
Question 174: To invisibly maintain access to a machine, an attacker utili...
Question 175: Daniel Is a professional hacker who Is attempting to perform...
Question 176: Which of the following provides a security professional with...
Question 177: An attacker with access to the inside network of a small com...
Question 178: Take a look at the following attack on a Web Server using ob...
Question 179: What two conditions must a digital signature meet?...
Question 180: What type of a vulnerability/attack is it when the malicious...
Question 181: You want to analyze packets on your wireless network. Which ...
Question 182: Mike, a security engineer, was recently hired by BigFox Ltd....
Question 183: What does the -oX flag do in an Nmap scan?...
Question 184: What is the file that determines the basic configuration (sp...
Question 185: Tess King is using the nslookup command to craft queries to ...
Question 186: Wilson, a professional hacker, targets an organization for f...
Question 187: A zone file consists of which of the following Resource Reco...
Question 188: Fingerprinting an Operating System helps a cracker because:...
Question 189: A penetration tester is conducting an assessment of a web ap...
Question 190: What kind of detection techniques is being used in antivirus...
Question 191: You are logged in as a local admin on a Windows 7 system and...
Question 192: Joseph was the Web site administrator for the Mason Insuranc...
Question 193: Which of the following is the BEST way to defend against net...
Question 194: Which DNS resource record can indicate how long any "DNS poi...
Question 195: A large corporate network is being subjected to repeated sni...
Question 196: What type of virus is most likely to remain undetected by an...
Question 197: You want to do an ICMP scan on a remote computer using hping...
Question 198: Bob, an attacker, has managed to access a target loT device....
Question 199: A large mobile telephony and data network operator has a dat...
Question 200: The configuration allows a wired or wireless network interfa...
Question 201: Emily, an extrovert obsessed with social media, posts a larg...
Question 202: Clark, a professional hacker, was hired by an organization l...
Question 203: Stella, a professional hacker, performs an attack on web ser...
Question 204: As a part of an ethical hacking exercise, an attacker is pro...
Question 205: Matthew, a black hat, has managed to open a meterpreter sess...
Question 206: Abel, a security professional, conducts penetration testing ...
Question 207: PGP, SSL, and IKE are all examples of which type of cryptogr...
Question 208: A well-resourced attacker intends to launch a highly disrupt...
Question 209: In the context of password security, a simple dictionary att...
Question 210: An attacker utilizes a Wi-Fi Pineapple to run an access poin...
Question 211: Which of the following options represents a conceptual chara...
Question 212: SQL injection (SQLi) attacks attempt to inject SQL syntax in...
Question 213: Attacker Rony installed a rogue access point within an organ...
Question 214: Annie, a cloud security engineer, uses the Docker architectu...
Question 215: Your company was hired by a small healthcare provider to per...
Question 216: An attacker scans a host with the below command. Which three...
Question 217: Insecure direct object reference is a type of vulnerability ...
Question 218: Sam, a web developer, was instructed to incorporate a hybrid...
Question 219: Within the context of Computer Security, which of the follow...
Question 220: Ron, a security professional, was pen testing web applicatio...
Question 221: In your cybersecurity class, you are learning about common s...
Question 222: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 223: Tremp is an IT Security Manager, and he is planning to deplo...
Question 224: Which results will be returned with the following Google sea...
Question 225: What is the first step for a hacker conducting a DNS cache p...
Question 226: While testing a web application in development, you notice t...
Question 227: You are tasked to perform a penetration test. While you are ...
Question 228: Roma is a member of a security team. She was tasked with pro...
Question 229: Which of the following tools can be used to perform a zone t...
Question 230: A company's Web development team has become aware of a certa...
Question 231: Nedved is an IT Security Manager of a bank in his country. O...
Question 232: Susan, a software developer, wants her web API to update oth...
Question 233: What is the algorithm used by LM for Windows2000 SAM?...