<< Prev Question Next Question >>

Question 13/173

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (173q)
Question 1: A network admin contacts you. He is concerned that ARP spoof...
Question 2: You are a penetration tester tasked with testing the wireles...
Question 3: You have gained physical access to a Windows 2008 R2 server ...
Question 4: The network in ABC company is using the network address 192....
Question 5: Leverox Solutions hired Arnold, a security professional, for...
Question 6: Jason, an attacker, targeted an organization to perform an a...
Question 7: Ralph, a professional hacker, targeted Jane, who had recentl...
Question 8: Which of the following allows attackers to draw a map or out...
Question 9: When analyzing the IDS logs, the system administrator notice...
Question 10: Which of the following antennas is commonly used in communic...
Question 11: What does the -oX flag do in an Nmap scan?...
Question 12: A company's policy requires employees to perform file transf...
Question 13: Nicolas just found a vulnerability on a public-facing system...
Question 14: You are performing a penetration test for a client and have ...
Question 15: You are using a public Wi-Fi network inside a coffee shop. B...
Question 16: This TCP flag instructs the sending system to transmit all b...
Question 17: One of your team members has asked you to analyze the follow...
Question 18: An attacker identified that a user and an access point are b...
Question 19: What is the proper response for a NULL scan if the port is c...
Question 20: A security analyst is performing an audit on the network to ...
Question 21: What does the following command in netcat do? nc -l -u -p555...
Question 22: Calvin, a grey-hat hacker, targets a web application that ha...
Question 23: Sam is working as a system administrator In an organization....
Question 24: Based on the below log, which of the following sentences are...
Question 25: The tools which receive event logs from servers, network equ...
Question 26: Becky has been hired by a client from Dubai to perform a pen...
Question 27: Which Nmap option would you use if you were not concerned ab...
Question 28: In this attack, a victim receives an e-mail claiming from Pa...
Question 29: Bob received this text message on his mobile phone: "Hello, ...
Question 30: A Security Engineer at a medium-sized accounting firm has be...
Question 31: What port number is used by LDAP protocol?...
Question 32: Robert, a professional hacker, is attempting to execute a fa...
Question 33: Emily, an extrovert obsessed with social media, posts a larg...
Question 34: PGP, SSL, and IKE are all examples of which type of cryptogr...
Question 35: Robin, a professional hacker, targeted an organization's net...
Question 36: When configuring wireless on his home router, Javik disables...
Question 37: What is the known plaintext attack used against DES which gi...
Question 38: What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht...
Question 39: is a set of extensions to DNS that provide the origin authen...
Question 40: CyberTech Inc. recently experienced SQL injection attacks on...
Question 41: Suppose that you test an application for the SQL injection v...
Question 42: After an audit, the auditors Inform you that there is a crit...
Question 43: Daniel Is a professional hacker who Is attempting to perform...
Question 44: John wants to send Marie an email that includes sensitive in...
Question 45: This type of injection attack does not show any error messag...
Question 46: How can rainbow tables be defeated?...
Question 47: What is the minimum number of network connections in a multi...
Question 48: John, a professional hacker, decided to use DNS to perform d...
Question 49: Alice needs to send a confidential document to her coworker....
Question 50: You have compromised a server and successfully gained a root...
Question 51: You work for Acme Corporation as Sales Manager. The company ...
Question 52: Which of the following program infects the system boot secto...
Question 53: John is investigating web-application firewall logs and obse...
Question 54: Which type of attack attempts to overflow the content-addres...
Question 55: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 56: John, a disgruntled ex-employee of an organization, contacte...
Question 57: Which of the following tools is used to detect wireless LANs...
Question 58: Rebecca, a security professional, wants to authenticate empl...
Question 59: What useful information is gathered during a successful Simp...
Question 60: What is not a PCI compliance recommendation?...
Question 61: Which of the following options represents a conceptual chara...
Question 62: Todd has been asked by the security officer to purchase a co...
Question 63: An attacker runs netcat tool to transfer a secret file betwe...
Question 64: "........is an attack type for a rogue Wi-Fi access point th...
Question 65: jane invites her friends Alice and John over for a LAN party...
Question 66: Henry is a penetration tester who works for XYZ organization...
Question 67: You are a penetration tester and are about to perform a scan...
Question 68: Cross-site request forgery involves:...
Question 69: If executives are found liable for not properly protecting t...
Question 70: What piece of hardware on a computer's motherboard generates...
Question 71: Which of the following is considered an exploit framework an...
Question 72: Lewis, a professional hacker, targeted the loT cameras and d...
Question 73: Stella, a professional hacker, performs an attack on web ser...
Question 74: Morris, an attacker, wanted to check whether the target AP i...
Question 75: James is working as an ethical hacker at Technix Solutions. ...
Question 76: Andrew is an Ethical Hacker who was assigned the task of dis...
Question 77: Which protocol is used for setting up secure channels betwee...
Question 78: What kind of detection techniques is being used in antivirus...
Question 79: Alex, a cloud security engineer working in Eyecloud Inc. is ...
Question 80: Which of the following incident handling process phases is r...
Question 81: When considering how an attacker may exploit a web server, w...
Question 82: Techno Security Inc. recently hired John as a penetration te...
Question 83: Which utility will tell you in real time which ports are lis...
Question 84: A "Server-Side Includes" attack refers to the exploitation o...
Question 85: An attacker, using a rogue wireless AP, performed an MITM at...
Question 86: You need a tool that can do network intrusion prevention and...
Question 87: Which Metasploit Framework tool can help penetration tester ...
Question 88: A group of hackers were roaming around a bank office buildin...
Question 89: You are logged in as a local admin on a Windows 7 system and...
Question 90: Alice, a professional hacker, targeted an organization's clo...
Question 91: You receive an e-mail like the one shown below. When you cli...
Question 92: SQL injection (SQLi) attacks attempt to inject SQL syntax in...
Question 93: You need to deploy a new web-based software package for your...
Question 94: Your organization has signed an agreement with a web hosting...
Question 95: Which of the following statements about a zone transfer is c...
Question 96: Samuel, a professional hacker, monitored and Intercepted alr...
Question 97: Juliet, a security researcher in an organization, was tasked...
Question 98: Which of the following tools can be used to perform a zone t...
Question 99: Elliot is in the process of exploiting a web application tha...
Question 100: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 101: What is the minimum number of network connections in a multi...
Question 102: in this form of encryption algorithm, every Individual block...
Question 103: You are a penetration tester working to test the user awaren...
Question 104: In the context of Windows Security, what is a 'null' user?...
Question 105: The collection of potentially actionable, overt, and publicl...
Question 106: Which of the following tools is used to analyze the files pr...
Question 107: The security team of Debry Inc. decided to upgrade Wi-Fi sec...
Question 108: As a securing consultant, what are some of the things you wo...
Question 109: Jacob works as a system administrator in an organization. He...
Question 110: Scenario1: 1. Victim opens the attacker's web site. 2. Attac...
Question 111: Jake, a professional hacker, installed spyware on a target i...
Question 112: Tremp is an IT Security Manager, and he is planning to deplo...
Question 113: Johnson, an attacker, performed online research for the cont...
Question 114: This wireless security protocol allows 192-bit minimum-stren...
Question 115: Mr. Omkar performed tool-based vulnerability assessment and ...
Question 116: Which of the following is a command line packet analyzer sim...
Question 117: Let's imagine three companies (A, B and C), all competing in...
Question 118: What tool can crack Windows SMB passwords simply by listenin...
Question 119: Email is transmitted across the Internet using the Simple Ma...
Question 120: Which of the following are well known password-cracking prog...
Question 121: Harris is attempting to identify the OS running on his targe...
Question 122: Attacker Rony Installed a rogue access point within an organ...
Question 123: Every company needs a formal written document which spells o...
Question 124: Kate dropped her phone and subsequently encountered an issue...
Question 125: Which of the following programs is usually targeted at Micro...
Question 126: Which of the following statements is FALSE with respect to I...
Question 127: Clark, a professional hacker, was hired by an organization l...
Question 128: Garry is a network administrator in an organization. He uses...
Question 129: joe works as an it administrator in an organization and has ...
Question 130: which type of virus can change its own code and then cipher ...
Question 131: Nedved is an IT Security Manager of a bank in his country. O...
Question 132: David is a security professional working in an organization,...
Question 133: Which Nmap switch helps evade IDS or firewalls?...
Question 134: Take a look at the following attack on a Web Server using ob...
Question 135: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 136: The change of a hard drive failure is once every three years...
Question 137: A network administrator discovers several unknown files in t...
Question 138: OpenSSL on Linux servers includes a command line tool for te...
Question 139: Jim, a professional hacker, targeted an organization that is...
Question 140: Consider the following Nmap output: (Exhibit) what command-l...
Question 141: Your company performs penetration tests and security assessm...
Question 142: You just set up a security system in your network. In what k...
Question 143: An unauthorized individual enters a building following an em...
Question 144: During an Xmas scan what indicates a port is closed?...
Question 145: Geena, a cloud architect, uses a master component in the Kub...
Question 146: Which of the following represents the initial two commands t...
Question 147: Which of the following commands checks for valid users on an...
Question 148: In both pharming and phishing attacks, an attacker can creat...
Question 149: An LDAP directory can be used to store information similar t...
Question 150: Which method of password cracking takes the most time and ef...
Question 151: Jude, a pen tester, examined a network from a hacker's persp...
Question 152: Bella, a security professional working at an it firm, finds ...
Question 153: During a recent security assessment, you discover the organi...
Question 154: Which of the following Google advanced search operators help...
Question 155: The network users are complaining because their system are s...
Question 156: Fred is the network administrator for his company. Fred is t...
Question 157: John, a professional hacker, targeted CyberSol Inc., an MNC....
Question 158: Which type of security feature stops vehicles from crashing ...
Question 159: An attacker has installed a RAT on a host. The attacker want...
Question 160: Which of the following describes the characteristics of a Bo...
Question 161: Henry Is a cyber security specialist hired by BlackEye - Cyb...
Question 162: Jack, a professional hacker, targets an organization and per...
Question 163: Eric, a cloud security engineer, implements a technique for ...
Question 164: Steve, a scientist who works in a governmental security agen...
Question 165: One of your team members has asked you to analyze the follow...
Question 166: You want to analyze packets on your wireless network. Which ...
Question 167: While scanning with Nmap, Patin found several hosts which ha...
Question 168: Attempting an injection attack on a web server based on resp...
Question 169: What useful information is gathered during a successful Simp...
Question 170: A penetration tester is performing the footprinting process ...
Question 171: The security administrator of ABC needs to permit Internet t...
Question 172: Which regulation defines security and privacy controls for F...
Question 173: Which of the following steps for risk assessment methodology...