<< Prev Question Next Question >>

Question 165/180

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the
192.168.1.0/24. Which of the following has occurred?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (180q)
Question 1: In which phase of the ethical hacking process can Google hac...
Question 2: A company's Web development team has become aware of a certa...
Question 3: What term describes the amount of risk that remains after th...
Question 4: You are a security officer of a company. You had an alert fr...
Question 5: In which of the following password protection technique, ran...
Question 6: Which access control mechanism allows for multiple systems t...
Question 7: A pen-tester is configuring a Windows laptop for a test. In ...
Question 8: When you are testing a web application, it is very useful to...
Question 9: The security administrator of ABC needs to permit Internet t...
Question 10: When you are collecting information to perform a data analys...
2 commentQuestion 11: If there is an Intrusion Detection System (IDS) in intranet,...
Question 12: When does the Payment Card Industry Data Security Standard (...
1 commentQuestion 13: You want to do an ICMP scan on a remote computer using hping...
Question 14: You are attempting to man-in-the-middle a session. Which pro...
Question 15: Which of the following will perform an Xmas scan using NMAP?...
Question 16: Which one of the following Google advanced search operators ...
Question 17: Gavin owns a white-hat firm and is performing a website secu...
Question 18: What is the way to decide how a packet will move from an unt...
Question 19: &gt;NMAP -sn 192.168.11.200-215 The NMAP command above perfo...
Question 20: In an internal security audit, the white hat hacker gains co...
Question 21: A virus that attempts to install itself inside the file it i...
Question 22: Which Metasploit Framework tool can help penetration tester ...
Question 23: It is a short-range wireless communication technology intend...
Question 24: Your company was hired by a small healthcare provider to per...
Question 25: What is the correct process for the TCP three-way handshake ...
Question 26: Your company performs penetration tests and security assessm...
Question 27: What network security concept requires multiple layers of se...
Question 28: In order to have an anonymous Internet surf, which of the fo...
Question 29: A network administrator discovers several unknown files in t...
Question 30: Seth is starting a penetration test from inside the network....
Question 31: Which of the following is the best countermeasure to encrypt...
Question 32: Due to a slowdown of normal network operations, the IT depar...
Question 33: Which of the following is a low-tech way of gaining unauthor...
Question 34: Which of the following security policies defines the use of ...
Question 35: What type of analysis is performed when an attacker has part...
Question 36: Which of the following is one of the most effective ways to ...
Question 37: During the security audit of IT processes, an IS auditor fou...
Question 38: Your team has won a contract to infiltrate an organization. ...
Question 39: What two conditions must a digital signature meet?...
Question 40: Based on the below log, which of the following sentences are...
Question 41: A hacker is an intelligent individual with excellent compute...
Question 42: Which of the following parameters describe LM Hash: I - The ...
Question 43: Tremp is an IT Security Manager, and he is planning to deplo...
Question 44: Port scanning can be used as part of a technical assessment ...
Question 45: Why should the security analyst disable/remove unnecessary I...
Question 46: Which of the following Bluetooth hacking techniques does an ...
Question 47: If a tester is attempting to ping a target that exists but r...
Question 48: A tester has been hired to do a web application security tes...
Question 49: A computer science student needs to fill some information in...
Question 50: Sophia travels a lot and worries that her laptop containing ...
1 commentQuestion 51: In which of the following cryptography attack methods, the a...
Question 52: You are performing a penetration test for a client and have ...
Question 53: John the Ripper is a technical assessment tool used to test ...
Question 54: The following is part of a log file taken from the machine o...
Question 55: Bob, a system administrator at TPNQM SA, concluded one day t...
Question 56: Todd has been asked by the security officer to purchase a co...
Question 57: Which of the following is a component of a risk assessment?...
Question 58: If you want only to scan fewer ports than the default scan u...
Question 59: Which of the following Linux commands will resolve a domain ...
Question 60: Trinity needs to scan all hosts on a /16 network for TCP por...
Question 61: Your business has decided to add credit card numbers to the ...
Question 62: Which security strategy requires using several, varying meth...
Question 63: Which of the following statements is TRUE?...
Question 64: Which of the following cryptography attack is an understatem...
Question 65: In 2007, this wireless security algorithm was rendered usele...
Question 66: What is the most secure way to mitigate the theft of corpora...
Question 67: Which of the following is the successor of SSL?...
Question 68: An enterprise recently moved to a new office and the new nei...
Question 69: In the field of cryptanalysis, what is meant by a "rubber-ho...
1 commentQuestion 70: You are monitoring the network of your organizations. You no...
Question 71: The collection of potentially actionable, overt, and publicl...
Question 72: During a recent security assessment, you discover the organi...
Question 73: A new wireless client is configured to join an 802.11 networ...
Question 74: Which of the following can the administrator do to verify th...
Question 75: PGP, SSL, and IKE are all examples of which type of cryptogr...
Question 76: Which of the following options represents a conceptual chara...
3 commentQuestion 77: Which of the following statements regarding ethical hacking ...
Question 78: A security analyst is performing an audit on the network to ...
Question 79: Alice encrypts her data using her public key PK and stores t...
Question 80: You are a Penetration Tester and are assigned to scan a serv...
Question 81: You are tasked to perform a penetration test. While you are ...
Question 82: What is the process of logging, recording, and resolving eve...
Question 83: Which tool allows analysts and pen testers to examine links ...
Question 84: Which Intrusion Detection System is the best applicable for ...
Question 85: Which of the following tools performs comprehensive tests ag...
Question 86: Steve, a scientist who works in a governmental security agen...
Question 87: Which of the following scanning method splits the TCP header...
Question 88: Which mode of IPSec should you use to assure security and co...
Question 89: Which of the following act requires employer's standard nati...
Question 90: Email is transmitted across the Internet using the Simple Ma...
Question 91: How can rainbow tables be defeated?...
Question 92: Scenario: 1. Victim opens the attacker's web site. 2. Attack...
Question 93: Emil uses nmap to scan two hosts using this command: nmap -s...
Question 94: You need to deploy a new web-based software package for your...
Question 95: WPA2 uses AES for wireless data encryption at which of the f...
Question 96: You are an Ethical Hacker who is auditing the ABC company. W...
Question 97: Which of the following programming languages is most suscept...
Question 98: This phase will increase the odds of success in later phases...
Question 99: Which of the following is a serious vulnerability in the pop...
Question 100: Which of the following tools is used to detect wireless LANs...
Question 101: Which of the following programs is usually targeted at Micro...
Question 102: Which of the following is the structure designed to verify a...
Question 103: Insecure direct object reference is a type of vulnerability ...
Question 104: An attacker with access to the inside network of a small com...
Question 105: It has been reported to you that someone has caused an infor...
Question 106: A hacker has successfully infected an internet-facing server...
Question 107: Which method of password cracking takes the most time and ef...
Question 108: The Open Web Application Security Project (OWASP) is the wor...
Question 109: The "Gray-box testing" methodology enforces what kind of res...
Question 110: Elliot is in the process of exploiting a web application tha...
Question 111: You are attempting to run an Nmap port scan on a web server....
Question 112: Peter is surfing the internet looking for information about ...
Question 113: Which service in a PKI will vouch for the identity of an ind...
Question 114: Identify the web application attack where the attackers expl...
Question 115: Risks=Threats x Vulnerabilities is referred to as the:...
Question 116: The following is part of a log file taken from the machine o...
Question 117: During an Xmas scan, what indicates a port is closed?...
Question 118: A well-intentioned researcher discovers a vulnerability on t...
Question 119: While scanning with Nmap, Patin found several hosts which ha...
Question 120: A hacker has managed to gain access to a Linux host and stol...
Question 121: Why is a penetration test considered to be more thorough tha...
Question 122: On performing a risk assessment, you need to determine the p...
Question 123: Jesse receives an email with an attachment labeled "Court_No...
Question 124: Which of the following program infects the system boot secto...
Question 125: An IT employee got a call from one our best customers. The c...
Question 126: Which type of security feature stops vehicles from crashing ...
Question 127: Which protocol is used for setting up secure channels betwee...
Question 128: As a Certified Ethical Hacker, you were contracted by a priv...
Question 129: You are tasked to configure the DHCP server to lease the las...
Question 130: Cross-site request forgery involves:...
Question 131: Which of the following describes the characteristics of a Bo...
Question 132: When purchasing a biometric system, one of the consideration...
Question 133: An Intrusion Detection System (IDS) has alerted the network ...
Question 134: Hackers often raise the trust level of a phishing message by...
Question 135: What would you enter, if you wanted to perform a stealth sca...
Question 136: You need a tool that can do network intrusion prevention and...
Question 137: Which of the following types of jailbreaking allows user-lev...
Question 138: DHCP snooping is a great solution to prevent rogue DHCP serv...
Question 139: What is the difference between the AES and RSA algorithms?...
Question 140: Jim's company regularly performs backups of their critical s...
2 commentQuestion 141: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 142: Which of the following Secure Hashing Algorithm (SHA) produc...
Question 143: How does the Address Resolution Protocol (ARP) work?...
Question 144: (Exhibit) What is the code written for?...
Question 145: Which of the following antennas is commonly used in communic...
Question 146: By using a smart card and pin, you are using a two-factor au...
Question 147: Sam is working as s pen-tester in an organization in Houston...
Question 148: Which of the following statements is FALSE with respect to I...
Question 149: Bob finished a C programming course and created a small C ap...
Question 150: A penetration test was done at a company. After the test, a ...
Question 151: What is a "Collision attack" in cryptography?...
Question 152: Suppose your company has just passed a security risk assessm...
Question 153: Websites and web portals that provide web services commonly ...
Question 154: The purpose of a _______is to deny network access to local a...
Question 155: If executives are found liable for not properly protecting t...
Question 156: Which results will be returned with the following Google sea...
Question 157: Which of these is capable of searching for and locating rogu...
Question 158: Log monitoring tools performing behavioral analysis have ale...
Question 159: When you are getting information about a web server, it is v...
Question 160: A regional bank hires your company to perform a security ass...
Question 161: An attacker attaches a rogue router in a network. He wants t...
Question 162: What does the -oX flag do in an Nmap scan?...
Question 163: What is not a PCI compliance recommendation?...
Question 164: Which of the following is an adaptive SQL Injection testing ...
Question 165: A technician is resolving an issue where a computer is unabl...
Question 166: You are performing a penetration test. You achieved access v...
Question 167: An attacker scans a host with the below command. Which three...
Question 168: The configuration allows a wired or wireless network interfa...
Question 169: When tuning security alerts, what is the best approach?...
Question 170: An attacker, using a rogue wireless AP, performed an MITM at...
Question 171: Which of the following steps for risk assessment methodology...
Question 172: In cryptanalysis and computer security, 'pass the hash' is a...
Question 173: Eve stole a file named secret.txt, transferred it to her com...
Question 174: Which component of IPsec performs protocol-level functions t...
Question 175: Which of the following is a passive wireless packet analyzer...
Question 176: What kind of detection techniques is being used in antivirus...
Question 177: OpenSSL on Linux servers includes a command line tool for te...
Question 178: You are monitoring the network of your organizations. You no...
Question 179: The "white box testing" methodology enforces what kind of re...
1 commentQuestion 180: An attacker is using nmap to do a ping sweep and a port scan...