<< Prev Question Next Question >>

Question 8/173

Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (173q)
Question 1: A network admin contacts you. He is concerned that ARP spoof...
Question 2: You are a penetration tester tasked with testing the wireles...
Question 3: You have gained physical access to a Windows 2008 R2 server ...
Question 4: The network in ABC company is using the network address 192....
Question 5: Leverox Solutions hired Arnold, a security professional, for...
Question 6: Jason, an attacker, targeted an organization to perform an a...
Question 7: Ralph, a professional hacker, targeted Jane, who had recentl...
Question 8: Which of the following allows attackers to draw a map or out...
Question 9: When analyzing the IDS logs, the system administrator notice...
Question 10: Which of the following antennas is commonly used in communic...
Question 11: What does the -oX flag do in an Nmap scan?...
Question 12: A company's policy requires employees to perform file transf...
Question 13: Nicolas just found a vulnerability on a public-facing system...
Question 14: You are performing a penetration test for a client and have ...
Question 15: You are using a public Wi-Fi network inside a coffee shop. B...
Question 16: This TCP flag instructs the sending system to transmit all b...
Question 17: One of your team members has asked you to analyze the follow...
Question 18: An attacker identified that a user and an access point are b...
Question 19: What is the proper response for a NULL scan if the port is c...
Question 20: A security analyst is performing an audit on the network to ...
Question 21: What does the following command in netcat do? nc -l -u -p555...
Question 22: Calvin, a grey-hat hacker, targets a web application that ha...
Question 23: Sam is working as a system administrator In an organization....
Question 24: Based on the below log, which of the following sentences are...
Question 25: The tools which receive event logs from servers, network equ...
Question 26: Becky has been hired by a client from Dubai to perform a pen...
Question 27: Which Nmap option would you use if you were not concerned ab...
Question 28: In this attack, a victim receives an e-mail claiming from Pa...
Question 29: Bob received this text message on his mobile phone: "Hello, ...
Question 30: A Security Engineer at a medium-sized accounting firm has be...
Question 31: What port number is used by LDAP protocol?...
Question 32: Robert, a professional hacker, is attempting to execute a fa...
Question 33: Emily, an extrovert obsessed with social media, posts a larg...
Question 34: PGP, SSL, and IKE are all examples of which type of cryptogr...
Question 35: Robin, a professional hacker, targeted an organization's net...
Question 36: When configuring wireless on his home router, Javik disables...
Question 37: What is the known plaintext attack used against DES which gi...
Question 38: What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht...
Question 39: is a set of extensions to DNS that provide the origin authen...
Question 40: CyberTech Inc. recently experienced SQL injection attacks on...
Question 41: Suppose that you test an application for the SQL injection v...
Question 42: After an audit, the auditors Inform you that there is a crit...
Question 43: Daniel Is a professional hacker who Is attempting to perform...
Question 44: John wants to send Marie an email that includes sensitive in...
Question 45: This type of injection attack does not show any error messag...
Question 46: How can rainbow tables be defeated?...
Question 47: What is the minimum number of network connections in a multi...
Question 48: John, a professional hacker, decided to use DNS to perform d...
Question 49: Alice needs to send a confidential document to her coworker....
Question 50: You have compromised a server and successfully gained a root...
Question 51: You work for Acme Corporation as Sales Manager. The company ...
Question 52: Which of the following program infects the system boot secto...
Question 53: John is investigating web-application firewall logs and obse...
Question 54: Which type of attack attempts to overflow the content-addres...
Question 55: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 56: John, a disgruntled ex-employee of an organization, contacte...
Question 57: Which of the following tools is used to detect wireless LANs...
Question 58: Rebecca, a security professional, wants to authenticate empl...
Question 59: What useful information is gathered during a successful Simp...
Question 60: What is not a PCI compliance recommendation?...
Question 61: Which of the following options represents a conceptual chara...
Question 62: Todd has been asked by the security officer to purchase a co...
Question 63: An attacker runs netcat tool to transfer a secret file betwe...
Question 64: "........is an attack type for a rogue Wi-Fi access point th...
Question 65: jane invites her friends Alice and John over for a LAN party...
Question 66: Henry is a penetration tester who works for XYZ organization...
Question 67: You are a penetration tester and are about to perform a scan...
Question 68: Cross-site request forgery involves:...
Question 69: If executives are found liable for not properly protecting t...
Question 70: What piece of hardware on a computer's motherboard generates...
Question 71: Which of the following is considered an exploit framework an...
Question 72: Lewis, a professional hacker, targeted the loT cameras and d...
Question 73: Stella, a professional hacker, performs an attack on web ser...
Question 74: Morris, an attacker, wanted to check whether the target AP i...
Question 75: James is working as an ethical hacker at Technix Solutions. ...
Question 76: Andrew is an Ethical Hacker who was assigned the task of dis...
Question 77: Which protocol is used for setting up secure channels betwee...
Question 78: What kind of detection techniques is being used in antivirus...
Question 79: Alex, a cloud security engineer working in Eyecloud Inc. is ...
Question 80: Which of the following incident handling process phases is r...
Question 81: When considering how an attacker may exploit a web server, w...
Question 82: Techno Security Inc. recently hired John as a penetration te...
Question 83: Which utility will tell you in real time which ports are lis...
Question 84: A "Server-Side Includes" attack refers to the exploitation o...
Question 85: An attacker, using a rogue wireless AP, performed an MITM at...
Question 86: You need a tool that can do network intrusion prevention and...
Question 87: Which Metasploit Framework tool can help penetration tester ...
Question 88: A group of hackers were roaming around a bank office buildin...
Question 89: You are logged in as a local admin on a Windows 7 system and...
Question 90: Alice, a professional hacker, targeted an organization's clo...
Question 91: You receive an e-mail like the one shown below. When you cli...
Question 92: SQL injection (SQLi) attacks attempt to inject SQL syntax in...
Question 93: You need to deploy a new web-based software package for your...
Question 94: Your organization has signed an agreement with a web hosting...
Question 95: Which of the following statements about a zone transfer is c...
Question 96: Samuel, a professional hacker, monitored and Intercepted alr...
Question 97: Juliet, a security researcher in an organization, was tasked...
Question 98: Which of the following tools can be used to perform a zone t...
Question 99: Elliot is in the process of exploiting a web application tha...
Question 100: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 101: What is the minimum number of network connections in a multi...
Question 102: in this form of encryption algorithm, every Individual block...
Question 103: You are a penetration tester working to test the user awaren...
Question 104: In the context of Windows Security, what is a 'null' user?...
Question 105: The collection of potentially actionable, overt, and publicl...
Question 106: Which of the following tools is used to analyze the files pr...
Question 107: The security team of Debry Inc. decided to upgrade Wi-Fi sec...
Question 108: As a securing consultant, what are some of the things you wo...
Question 109: Jacob works as a system administrator in an organization. He...
Question 110: Scenario1: 1. Victim opens the attacker's web site. 2. Attac...
Question 111: Jake, a professional hacker, installed spyware on a target i...
Question 112: Tremp is an IT Security Manager, and he is planning to deplo...
Question 113: Johnson, an attacker, performed online research for the cont...
Question 114: This wireless security protocol allows 192-bit minimum-stren...
Question 115: Mr. Omkar performed tool-based vulnerability assessment and ...
Question 116: Which of the following is a command line packet analyzer sim...
Question 117: Let's imagine three companies (A, B and C), all competing in...
Question 118: What tool can crack Windows SMB passwords simply by listenin...
Question 119: Email is transmitted across the Internet using the Simple Ma...
Question 120: Which of the following are well known password-cracking prog...
Question 121: Harris is attempting to identify the OS running on his targe...
Question 122: Attacker Rony Installed a rogue access point within an organ...
Question 123: Every company needs a formal written document which spells o...
Question 124: Kate dropped her phone and subsequently encountered an issue...
Question 125: Which of the following programs is usually targeted at Micro...
Question 126: Which of the following statements is FALSE with respect to I...
Question 127: Clark, a professional hacker, was hired by an organization l...
Question 128: Garry is a network administrator in an organization. He uses...
Question 129: joe works as an it administrator in an organization and has ...
Question 130: which type of virus can change its own code and then cipher ...
Question 131: Nedved is an IT Security Manager of a bank in his country. O...
Question 132: David is a security professional working in an organization,...
Question 133: Which Nmap switch helps evade IDS or firewalls?...
Question 134: Take a look at the following attack on a Web Server using ob...
Question 135: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 136: The change of a hard drive failure is once every three years...
Question 137: A network administrator discovers several unknown files in t...
Question 138: OpenSSL on Linux servers includes a command line tool for te...
Question 139: Jim, a professional hacker, targeted an organization that is...
Question 140: Consider the following Nmap output: (Exhibit) what command-l...
Question 141: Your company performs penetration tests and security assessm...
Question 142: You just set up a security system in your network. In what k...
Question 143: An unauthorized individual enters a building following an em...
Question 144: During an Xmas scan what indicates a port is closed?...
Question 145: Geena, a cloud architect, uses a master component in the Kub...
Question 146: Which of the following represents the initial two commands t...
Question 147: Which of the following commands checks for valid users on an...
Question 148: In both pharming and phishing attacks, an attacker can creat...
Question 149: An LDAP directory can be used to store information similar t...
Question 150: Which method of password cracking takes the most time and ef...
Question 151: Jude, a pen tester, examined a network from a hacker's persp...
Question 152: Bella, a security professional working at an it firm, finds ...
Question 153: During a recent security assessment, you discover the organi...
Question 154: Which of the following Google advanced search operators help...
Question 155: The network users are complaining because their system are s...
Question 156: Fred is the network administrator for his company. Fred is t...
Question 157: John, a professional hacker, targeted CyberSol Inc., an MNC....
Question 158: Which type of security feature stops vehicles from crashing ...
Question 159: An attacker has installed a RAT on a host. The attacker want...
Question 160: Which of the following describes the characteristics of a Bo...
Question 161: Henry Is a cyber security specialist hired by BlackEye - Cyb...
Question 162: Jack, a professional hacker, targets an organization and per...
Question 163: Eric, a cloud security engineer, implements a technique for ...
Question 164: Steve, a scientist who works in a governmental security agen...
Question 165: One of your team members has asked you to analyze the follow...
Question 166: You want to analyze packets on your wireless network. Which ...
Question 167: While scanning with Nmap, Patin found several hosts which ha...
Question 168: Attempting an injection attack on a web server based on resp...
Question 169: What useful information is gathered during a successful Simp...
Question 170: A penetration tester is performing the footprinting process ...
Question 171: The security administrator of ABC needs to permit Internet t...
Question 172: Which regulation defines security and privacy controls for F...
Question 173: Which of the following steps for risk assessment methodology...