<< Prev Question Next Question >>

Question 11/129

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (129q)
Question 1: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 2: Which of the following tools are used for enumeration? (Choo...
Question 3: Which of the following program infects the system boot secto...
Question 4: You receive an e-mail like the one shown below. When you cli...
Question 5: If you want to only scan fewer ports than the default scan u...
Question 6: Robin, a professional hacker, targeted an organization's net...
Question 7: Your company was hired by a small healthcare provider to per...
Question 8: A new wireless client is configured to join a 802.11 network...
Question 9: What is the first step for a hacker conducting a DNS cache p...
Question 10: Eve is spending her day scanning the library computers. She ...
Question 11: What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht...
Question 12: Which regulation defines security and privacy controls for F...
Question 13: You have been authorized to perform a penetration test again...
Question 14: Which command can be used to show the current TCP/IP connect...
1 commentQuestion 15: You have successfully logged on a Linux system. You want to ...
Question 16: infecting a system with malware and using phishing to gain c...
Question 17: This form of encryption algorithm is asymmetric key block ci...
Question 18: Peter, a Network Administrator, has come to you looking for ...
Question 19: What is correct about digital signatures?...
Question 20: Study the following log extract and identify the attack. (Ex...
Question 21: What does the -oX flag do in an Nmap scan?...
3 commentQuestion 22: In order to tailor your tests during a web-application scan,...
Question 23: Bob received this text message on his mobile phone: "Hello, ...
1 commentQuestion 24: Clark is a professional hacker. He created and configured mu...
Question 25: When a normal TCP connection starts, a destination host rece...
Question 26: Allen, a professional pen tester, was hired by xpertTech sol...
Question 27: The collection of potentially actionable, overt, and publicl...
Question 28: The network administrator at Spears Technology, Inc has conf...
Question 29: An attacker attaches a rogue router in a network. He wants t...
Question 30: How can you determine if an LM hash you extracted contains a...
Question 31: Taylor, a security professional, uses a tool to monitor her ...
Question 32: The establishment of a TCP connection involves a negotiation...
Question 33: which of the following Bluetooth hacking techniques refers t...
Question 34: You have retrieved the raw hash values from a Windows 2000 D...
Question 35: Ricardo has discovered the username for an application in hi...
Question 36: Widespread fraud ac Enron. WorldCom, and Tyco led to the cre...
Question 37: Bob, a system administrator at TPNQM SA, concluded one day t...
Question 38: Which type of sniffing technique is generally referred as Mi...
Question 39: The following is an entry captured by a network IDS. You are...
Question 40: What is the proper response for a NULL scan if the port is o...
Question 41: Every company needs a formal written document which spells o...
Question 42: The network team has well-established procedures to follow f...
Question 43: What is the purpose of DNS AAAA record?...
Question 44: Richard, an attacker, aimed to hack loT devices connected to...
Question 45: Dorian Is sending a digitally signed email to Polly, with wh...
Question 46: What is the proper response for a NULL scan if the port is c...
Question 47: John, a professional hacker, decided to use DNS to perform d...
Question 48: John is an incident handler at a financial institution. His ...
Question 49: In an internal security audit, the white hat hacker gains co...
Question 50: Peter is surfing the internet looking for information about ...
Question 51: Internet Protocol Security IPsec is actually a suite pf prot...
Question 52: (Exhibit) Identify the correct terminology that defines the ...
Question 53: Yancey is a network security administrator for a large elect...
Question 54: in an attempt to increase the security of your network, you ...
Question 55: Heather's company has decided to use a new customer relation...
Question 56: Daniel Is a professional hacker who Is attempting to perform...
Question 57: Which results will be returned with the following Google sea...
Question 58: During a recent security assessment, you discover the organi...
Question 59: Which of the following represents the initial two commands t...
Question 60: An organization is performing a vulnerability assessment tor...
Question 61: Susan has attached to her company's network. She has managed...
Question 62: Which definition among those given below best describes a co...
Question 63: Which of the following Linux commands will resolve a domain ...
Question 64: Johnson, an attacker, performed online research for the cont...
Question 65: John, a professional hacker, performs a network attack on a ...
1 commentQuestion 66: Annie, a cloud security engineer, uses the Docker architectu...
Question 67: To reach a bank web site, the traffic from workstations must...
Question 68: You have gained physical access to a Windows 2008 R2 server ...
1 commentQuestion 69: Alice needs to send a confidential document to her coworker....
Question 70: Wilson, a professional hacker, targets an organization for f...
Question 71: While browsing his Facebook teed, Matt sees a picture one of...
Question 72: The network users are complaining because their system are s...
Question 73: Which of the following tools can be used for passive OS fing...
Question 74: Which of the following LM hashes represent a password of les...
Question 75: There have been concerns in your network that the wireless n...
Question 76: A hacker is an intelligent individual with excellent compute...
1 commentQuestion 77: Bob was recently hired by a medical company after it experie...
1 commentQuestion 78: These hackers have limited or no training and know how to us...
Question 79: What is the BEST alternative if you discover that a rootkit ...
Question 80: What is a NULL scan?
Question 81: in this form of encryption algorithm, every Individual block...
Question 82: When purchasing a biometric system, one of the consideration...
Question 83: jane, an ethical hacker. Is testing a target organization's ...
Question 84: Kevin, a professional hacker, wants to penetrate CyberTech I...
Question 85: Fred is the network administrator for his company. Fred is t...
Question 86: You start performing a penetration test against a specific w...
Question 87: An attacker has installed a RAT on a host. The attacker want...
Question 88: Abel, a cloud architect, uses container technology to deploy...
Question 89: Eric has discovered a fantastic package of tools named Dsnif...
Question 90: DNS cache snooping is a process of determining if the specif...
1 commentQuestion 91: Samuel, a professional hacker, monitored and Intercepted alr...
Question 92: You are performing a penetration test for a client and have ...
Question 93: What is not a PCI compliance recommendation?...
Question 94: what are common files on a web server that can be misconfigu...
Question 95: A penetration tester is conducting a port scan on a specific...
Question 96: Andrew is an Ethical Hacker who was assigned the task of dis...
Question 97: Switches maintain a CAM Table that maps individual MAC addre...
Question 98: User A is writing a sensitive email message to user B outsid...
Question 99: _________ is a tool that can hide processes from the process...
Question 100: what is the port to block first in case you are suspicious t...
Question 101: Your company performs penetration tests and security assessm...
Question 102: You are the Network Admin, and you get a complaint that some...
Question 103: Nedved is an IT Security Manager of a bank in his country. O...
1 commentQuestion 104: Susan, a software developer, wants her web API to update oth...
1 commentQuestion 105: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 106: You are analysing traffic on the network with Wireshark. You...
Question 107: Scenario1: 1.Victim opens the attacker's web site. 2.Attacke...
Question 108: Attacker Rony Installed a rogue access point within an organ...
Question 109: Which type of security feature stops vehicles from crashing ...
Question 110: After an audit, the auditors Inform you that there is a crit...
Question 111: Peter extracts the SIDs list from Windows 2000 Server machin...
Question 112: While performing online banking using a Web browser, a user ...
Question 113: Which service in a PKI will vouch for the identity of an ind...
Question 114: MX record priority increases as the number increases. (True/...
Question 115: A large company intends to use Blackberry for corporate mobi...
Question 116: Which of the following is the structure designed to verify a...
Question 117: This wireless security protocol allows 192-bit minimum-stren...
Question 118: Identify the web application attack where the attackers expl...
Question 119: How is the public key distributed in an orderly, controlled ...
Question 120: The configuration allows a wired or wireless network interfa...
Question 121: The tools which receive event logs from servers, network equ...
Question 122: Gilbert, a web developer, uses a centralized web API to redu...
Question 123: You are programming a buffer overflow exploit and you want t...
Question 124: You just set up a security system in your network. In what k...
Question 125: What hacking attack is challenge/response authentication use...
Question 126: A technician is resolving an issue where a computer is unabl...
Question 127: An LDAP directory can be used to store information similar t...
Question 128: Morris, a professional hacker, performed a vulnerability sca...
Question 129: Which of the following statements about a zone transfer is c...