<< Prev Question Next Question >>

Question 110/169

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (169q)
Question 1: A regional bank hires your company to perform a security ass...
Question 2: You are attempting to man-in-the-middle a session. Which pro...
Question 3: An attacker uses a communication channel within an operating...
Question 4: Which of the following is the successor of SSL?...
Question 5: WPA2 uses AES for wireless data encryption at which of the f...
Question 6: Assume a business-crucial web-site of some company that is u...
Question 7: A hacker was able to sniff packets on a company's wireless n...
Question 8: If executives are found liable for not properly protecting t...
Question 9: Which type of security feature stops vehicles from crashing ...
Question 10: Why should the security analyst disable/remove unnecessary I...
Question 11: While scanning with Nmap, Patin found several hosts which ha...
Question 12: You have successfully comprised a server having an IP addres...
Question 13: Which of the following is an NMAP script that could help det...
Question 14: In the context of password security, a simple dictionary att...
Question 15: While reviewing the result of scanning run against a target ...
Question 16: An attacker, using a rogue wireless AP, performed an MITM at...
Question 17: Which of the following antennas is commonly used in communic...
Question 18: Which of the following is the best countermeasure to encrypt...
Question 19: An attacker attaches a rogue router in a network. He wants t...
Question 20: Passive reconnaissance involves collecting information throu...
Question 21: You are tasked to configure the DHCP server to lease the las...
Question 22: Which of the following programming languages is most suscept...
Question 23: Some clients of TPNQM SA were redirected to a malicious site...
Question 24: Which tool allows analysts and pen testers to examine links ...
Question 25: Which type of intrusion detection system can monitor and ale...
Question 26: What is a "Collision attack" in cryptography?...
Question 27: Which of the following resources does NMAP need to be used a...
Question 28: Every company needs a formal written document which spells o...
Question 29: The use of technologies like IPSec can help guarantee the fo...
Question 30: Which of the following is the BEST way to defend against net...
Question 31: Which of the following can the administrator do to verify th...
Question 32: Look at the following output. What did the hacker accomplish...
Question 33: The following is a sample of output from a penetration teste...
Question 34: Which of the following is an extremely common IDS evasion te...
Question 35: What is a "Collision attack" in cryptography?...
Question 36: A company's Web development team has become aware of a certa...
Question 37: Which method of password cracking takes the most time and ef...
Question 38: An incident investigator asks to receive a copy of the event...
Question 39: Susan has attached to her company's network. She has managed...
Question 40: A server has been infected by a certain type of Trojan. The ...
Question 41: Why containers are less secure that virtual machine?...
Question 42: You are tasked to configure the DHCP server to lease the las...
Question 43: Which of the following is assured by the use of a hash?...
Question 44: Alice encrypts her data using her public key PK and stores t...
Question 45: The security administrator of ABC needs to permit Internet t...
Question 46: A hacker is an intelligent individual with excellent compute...
Question 47: Bob learned that his username and password for a popular gam...
Question 48: You have successfully compromised a machine on the network a...
Question 49: A penetration tester is attempting to scan an internal corpo...
Question 50: In Trojan terminology, what is a covert channel? (Exhibit)...
Question 51: You are trying to break into a highly classified top-secret ...
Question 52: Which of the following tools is used by pen testers and anal...
Question 53: Which of the following Nmap commands will produce the follow...
Question 54: The security administrator of ABC needs to permit Internet t...
Question 55: The Open Web Application Security Project (OWASP) is the wor...
Question 56: A network administrator discovers several unknown files in t...
Question 57: What tool and process are you going to use in order to remai...
Question 58: What are two things that are possible when scanning UDP port...
Question 59: While testing the company's web applications, a tester attem...
Question 60: Assume a business-crucial web-site of some company that is u...
Question 61: Your team has won a contract to infiltrate an organization. ...
Question 62: Which of the following tools would MOST LIKELY be used to pe...
Question 63: Which of the following programming languages is most suscept...
Question 64: Bob received this text message on his mobile phone: ""Hello,...
Question 65: An attacker is trying to redirect the traffic of a small off...
Question 66: What is attempting an injection attack on a web server based...
Question 67: After trying multiple exploits, you've gained root access to...
Question 68: A circuit level gateway works at which of the following laye...
Question 69: A specific site received 91 ICMP_ECHO packets within 90 minu...
Question 70: Which of the following Nmap commands will produce the follow...
Question 71: An organization hires a tester to do a wireless penetration ...
Question 72: A large company intends to use Blackberry for corporate mobi...
Question 73: A pentester is using Metasploit to exploit an FTP server and...
Question 74: Using Windows CMD, how would an attacker list all the shares...
Question 75: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 76: Which of the following is a serious vulnerability in the pop...
Question 77: If you want only to scan fewer ports than the default scan u...
Question 78: In which of the following cryptography attack methods, the a...
Question 79: A technician is resolving an issue where a computer is unabl...
Question 80: A large company intends to use Blackberry for corporate mobi...
Question 81: What are the three types of authentication?...
Question 82: Which of the following is the least-likely physical characte...
Question 83: Which of the following steps for risk assessment methodology...
Question 84: You need a tool that can do network intrusion prevention and...
Question 85: You are doing an internal security audit and intend to find ...
Question 86: What are the three types of compliance that the Open Source ...
Question 87: What is a "Collision attack" in cryptography?...
Question 88: ........is an attack type for a rogue Wi-Fi access point tha...
Question 89: Which of the following is the successor of SSL?...
Question 90: ICMP ping and ping sweeps are used to check for active syste...
Question 91: A hacker is attempting to use nslookup to query Domain Name ...
Question 92: What is the best defense against privilege escalation vulner...
Question 93: It is an entity or event with the potential to adversely imp...
Question 94: Which tool can be used to silently copy files from USB devic...
Question 95: Study the snort rule given below: (Exhibit) From the options...
Question 96: TCP/IP stack fingerprinting is the passive collection of con...
Question 97: Which of the following guidelines or standards is associated...
Question 98: You have successfully gained access to a Linux server and wo...
Question 99: A computer technician is using a new version of a word proce...
Question 100: Which of the following is not a Bluetooth attack?...
Question 101: During a penetration test, a tester finds a target that is r...
Question 102: You are monitoring the network of your organizations. You no...
Question 103: Cryptography is the practice and study of techniques for sec...
Question 104: One advantage of an application-level firewall is the abilit...
Question 105: Jesse receives an email with an attachment labeled "Court_No...
Question 106: Which of the following programming languages is most suscept...
Question 107: In the field of cryptanalysis, what is meant by a "rubber-ho...
Question 108: From the two screenshots below, which of the following is oc...
Question 109: Cryptography is the practice and study of techniques for sec...
Question 110: To determine if a software program properly handles a wide r...
Question 111: DNS cache snooping is a process of determining if the specif...
Question 112: What is the code written for? (Exhibit)...
Question 113: Emil uses nmap to scan two hosts using this command: nmap -s...
Question 114: Which of the following is an adaptive SQL Injection testing ...
Question 115: During a black-box pen test you attempt to pass IRC traffic ...
Question 116: Which of the following is considered an acceptable option wh...
Question 117: A zone file consists of which of the following Resource Reco...
Question 118: Which of the following is the least-likely physical characte...
Question 119: A company's Web development team has become aware of a certa...
Question 120: The intrusion detection system at a software development com...
Question 121: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 122: What did the following commands determine? (Exhibit)...
Question 123: This is an attack that takes advantage of a web site vulnera...
Question 124: Let's imagine three companies (A, B and C), all competing in...
Question 125: Which of the following steps for risk assessment methodology...
Question 126: What does the following command in netcat do? nc -l -u -p555...
Question 127: To determine if a software program properly handles a wide r...
Question 128: An unauthorized individual enters a building following an em...
Question 129: What is the process of logging, recording, and resolving eve...
Question 130: You are attempting to run an Nmap port scan on a web server....
Question 131: Joseph was the Web site administrator for the Mason Insuranc...
Question 132: The use of alert thresholding in an IDS can reduce the volum...
Question 133: Your team has won a contract to infiltrate an organization. ...
Question 134: Which of the following tools is used to detect wireless LANs...
Question 135: You are performing a penetration test for a client and have ...
Question 136: Risks = Threats x Vulnerabilities is referred to as the:...
Question 137: Which of the following scanning tools is specifically design...
Question 138: Sophia travels a lot and worries that her laptop containing ...
Question 139: Which type of access control is used on a router or firewall...
Question 140: A consultant has been hired by the V.P. of a large financial...
Question 141: Which cipher encrypts the plain text digit (bit or byte) one...
Question 142: Which of the following security operations is used for deter...
Question 143: Jimmy is standing outside a secure entrance to a facility. H...
Question 144: Which of the following tools performs comprehensive tests ag...
Question 145: Bob is acknowledged as a hacker of repute and is popular amo...
Question 146: You are a Network Security Officer. You have two machines. T...
Question 147: Firewalk has just completed the second phase (the scanning p...
Question 148: What does a firewall check to prevent particular ports and a...
Question 149: A big company, who wanted to test their security infrastruct...
Question 150: Nation-state threat actors often discover vulnerabilities an...
Question 151: A bank stores and processes sensitive privacy information re...
Question 152: The establishment of a TCP connection involves a negotiation...
Question 153: An IT employee got a call from one our best customers. The c...
Question 154: What is the role of test automation in security testing?...
Question 155: Trinity needs to scan all hosts on a /16 network for TCP por...
Question 156: An attacker gains access to a Web server's database and disp...
Question 157: Advanced encryption standard is an algorithm used for which ...
Question 158: Under the "Post-attack Phase and Activities", it is the resp...
Question 159: Which of the following can the administrator do to verify th...
Question 160: One of your team members has asked you to analyze the follow...
Question 161: Session splicing is an IDS evasion technique in which an att...
Question 162: What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht...
Question 163: From the two screenshots below, which of the following is oc...
Question 164: The security administrator of ABC needs to permit Internet t...
Question 165: An attacker sniffs encrypted traffic from the network and is...
Question 166: An enterprise recently moved to a new office and the new nei...
Question 167: The "white box testing" methodology enforces what kind of re...
Question 168: Which of the following is a command line packet analyzer sim...
Question 169: Websites and web portals that provide web services commonly ...