<< Prev Question Next Question >>

Question 31/207

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (207q)
Question 1: Which of the following web vulnerabilities would an attacker...
Question 2: You are a security officer of a company. You had an alert fr...
Question 3: SQL injection (SQLi) attacks attempt to inject SQL syntax in...
Question 4: What is the known plaintext attack used against DES which gi...
Question 5: What is the file that determines the basic configuration (sp...
Question 6: Which of the following viruses tries to hide from anti-virus...
Question 7: This wireless security protocol allows 192-bit minimum-stren...
Question 8: How is the public key distributed in an orderly, controlled ...
Question 9: The change of a hard drive failure is once every three years...
Question 10: _________ is a type of phishing that targets high-profile ex...
Question 11: During a black-box pen test you attempt to pass IRC traffic ...
Question 12: What type of virus is most likely to remain undetected by an...
Question 13: A zone file consists of which of the following Resource Reco...
Question 14: In the context of Windows Security, what is a 'null' user?...
Question 15: Dorian Is sending a digitally signed email to Polly, with wh...
Question 16: The network in ABC company is using the network address 192....
Question 17: What port number is used by LDAP protocol?...
Question 18: What is the role of test automation in security testing?...
Question 19: Which address translation scheme would allow a single public...
Question 20: Bob, a system administrator at TPNQM SA, concluded one day t...
Question 21: Websites and web portals that provide web services commonly ...
Question 22: Suppose that you test an application for the SQL injection v...
Question 23: Null sessions are un-authenticated connections (not using a ...
Question 24: Robin, an attacker, is attempting to bypass the firewalls of...
Question 25: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 26: Which method of password cracking takes the most time and ef...
Question 27: Why should the security analyst disable/remove unnecessary I...
Question 28: Tony is a penetration tester tasked with performing a penetr...
Question 29: An Internet Service Provider (ISP) has a need to authenticat...
Question 30: Which of the following is assured by the use of a hash?...
Question 31: Which type of malware spreads from one system to another or ...
Question 32: Which mode of IPSec should you use to assure security and co...
Question 33: To hide the file on a Linux system, you have to start the fi...
Question 34: BitLocker encryption has been implemented for all the Window...
Question 35: Techno Security Inc. recently hired John as a penetration te...
Question 36: John is an incident handler at a financial institution. His ...
Question 37: Ralph, a professional hacker, targeted Jane, who had recentl...
Question 38: Which of the following are well known password-cracking prog...
Question 39: Which of the following Metasploit post-exploitation modules ...
Question 40: OpenSSL on Linux servers includes a command line tool for te...
Question 41: Abel, a security professional, conducts penetration testing ...
Question 42: Jane is working as a security professional at CyberSol Inc. ...
Question 43: Bob is doing a password assessment for one of his clients. B...
Question 44: is a set of extensions to DNS that provide the origin authen...
Question 45: These hackers have limited or no training and know how to us...
Question 46: Samuel, a professional hacker, monitored and Intercepted alr...
Question 47: Why would you consider sending an email to an address that y...
Question 48: You are a penetration tester tasked with testing the wireles...
Question 49: What tool can crack Windows SMB passwords simply by listenin...
Question 50: An attacker identified that a user and an access point are b...
Question 51: What is a "Collision attack" in cryptography?...
Question 52: Bob received this text message on his mobile phone: "Hello, ...
Question 53: Matthew, a black hat, has managed to open a meterpreter sess...
Question 54: Which is the first step followed by Vulnerability Scanners f...
Question 55: A friend of yours tells you that he downloaded and executed ...
Question 56: Attacker Lauren has gained the credentials of an organizatio...
Question 57: What would be the purpose of running "wget 192.168.0.15 -q -...
Question 58: Tremp is an IT Security Manager, and he is planning to deplo...
Question 59: Which among the following is the best example of the hacking...
Question 60: Eric has discovered a fantastic package of tools named Dsnif...
Question 61: Steve, an attacker, created a fake profile on a social media...
Question 62: John, a professional hacker, targeted an organization that u...
Question 63: The establishment of a TCP connection involves a negotiation...
Question 64: Nicolas just found a vulnerability on a public-facing system...
Question 65: which type of virus can change its own code and then cipher ...
Question 66: After an audit, the auditors Inform you that there is a crit...
Question 67: During the process of encryption and decryption, what keys a...
Question 68: in this form of encryption algorithm, every Individual block...
Question 69: Which rootkit is characterized by its function of adding cod...
Question 70: The network administrator at Spears Technology, Inc has conf...
Question 71: You have compromised a server and successfully gained a root...
Question 72: A "Server-Side Includes" attack refers to the exploitation o...
Question 73: An Intrusion Detection System (IDS) has alerted the network ...
Question 74: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 75: What is the algorithm used by LM for Windows2000 SAM?...
Question 76: An organization is performing a vulnerability assessment tor...
Question 77: Which of the following is a component of a risk assessment?...
Question 78: Widespread fraud ac Enron. WorldCom, and Tyco led to the cre...
Question 79: Nedved is an IT Security Manager of a bank in his country. O...
Question 80: Scenario1: 1. Victim opens the attacker's web site. 2. Attac...
Question 81: What did the following commands determine? (Exhibit)...
Question 82: Elliot is in the process of exploiting a web application tha...
Question 83: What is a NULL scan?
Question 84: Bob, your senior colleague, has sent you a mail regarding a ...
Question 85: Clark, a professional hacker, attempted to perform a Btlejac...
Question 86: The following is an entry captured by a network IDS. You are...
Question 87: Geena, a cloud architect, uses a master component in the Kub...
Question 88: Email is transmitted across the Internet using the Simple Ma...
Question 89: In the field of cryptanalysis, what is meant by a "rubber-ho...
Question 90: One of your team members has asked you to analyze the follow...
Question 91: Based on the below log, which of the following sentences are...
Question 92: Suppose your company has just passed a security risk assessm...
Question 93: Allen, a professional pen tester, was hired by xpertTech sol...
Question 94: Mr. Omkar performed tool-based vulnerability assessment and ...
Question 95: Which tier in the N-tier application architecture is respons...
Question 96: John, a security analyst working for an organization, found ...
Question 97: Which definition among those given below best describes a co...
Question 98: Study the snort rule given below: (Exhibit) From the options...
Question 99: George is a security professional working for iTech Solution...
Question 100: Which access control mechanism allows for multiple systems t...
Question 101: What does the following command in netcat do? nc -l -u -p555...
Question 102: A Security Engineer at a medium-sized accounting firm has be...
Question 103: A large company intends to use Blackberry for corporate mobi...
Question 104: An LDAP directory can be used to store information similar t...
Question 105: An attacker with access to the inside network of a small com...
Question 106: Judy created a forum, one day. she discovers that a user is ...
Question 107: You receive an e-mail like the one shown below. When you cli...
Question 108: Which of the following provides a security professional with...
Question 109: When you are testing a web application, it is very useful to...
Question 110: Which of the following DoS tools is used to attack target we...
Question 111: CompanyXYZ has asked you to assess the security of their per...
Question 112: What is the main security service a cryptographic hash provi...
Question 113: Tony wants to integrate a 128-bit symmetric block cipher wit...
Question 114: A security analyst is performing an audit on the network to ...
Question 115: You are attempting to crack LM Manager hashed from Windows 2...
Question 116: Which tool can be used to silently copy files from USB devic...
Question 117: "........is an attack type for a rogue Wi-Fi access point th...
Question 118: Given below are different steps involved in the vulnerabilit...
Question 119: The Payment Card Industry Data Security Standard (PCI DSS) c...
Question 120: What is the way to decide how a packet will move from an unt...
Question 121: The Heartbleed bug was discovered in 2014 and is widely refe...
Question 122: Study the following log extract and identify the attack. (Ex...
Question 123: Which of the following tools performs comprehensive tests ag...
Question 124: When considering how an attacker may exploit a web server, w...
Question 125: To determine if a software program properly handles a wide r...
Question 126: Your company performs penetration tests and security assessm...
Question 127: Harris is attempting to identify the OS running on his targe...
Question 128: Sam is working as a system administrator In an organization....
Question 129: Your organization has signed an agreement with a web hosting...
Question 130: How can rainbow tables be defeated?...
Question 131: Bob, your senior colleague, has sent you a mail regarding a ...
Question 132: Which of the following antennas is commonly used in communic...
Question 133: Study the snort rule given below and interpret the rule. ale...
Question 134: This TCP flag instructs the sending system to transmit all b...
Question 135: While testing a web application in development, you notice t...
Question 136: While browsing his Facebook teed, Matt sees a picture one of...
Question 137: Miley, a professional hacker, decided to attack a target org...
Question 138: The security administrator of ABC needs to permit Internet t...
Question 139: Johnson, an attacker, performed online research for the cont...
Question 140: What piece of hardware on a computer's motherboard generates...
Question 141: This kind of password cracking method uses word lists in com...
Question 142: If executives are found liable for not properly protecting t...
Question 143: What is the proper response for a NULL scan if the port is c...
Question 144: Take a look at the following attack on a Web Server using ob...
Question 145: You are programming a buffer overflow exploit and you want t...
Question 146: Session splicing is an IDS evasion technique in which an att...
Question 147: if you send a TCP ACK segment to a known closed port on a fi...
Question 148: An attacker scans a host with the below command. Which three...
Question 149: Security administrator John Smith has noticed abnormal amoun...
Question 150: What is the minimum number of network connections in a multi...
Question 151: Which of the following tools are used for enumeration? (Choo...
Question 152: which of the following protocols can be used to secure an LD...
Question 153: MX record priority increases as the number increases. (True/...
Question 154: Which of the following program infects the system boot secto...
Question 155: Kevin, a professional hacker, wants to penetrate CyberTech I...
Question 156: Mary, a penetration tester, has found password hashes in a c...
Question 157: Bill has been hired as a penetration tester and cyber securi...
Question 158: Which of the following represents the initial two commands t...
Question 159: Harper, a software engineer, is developing an email applicat...
Question 160: George, an employee of an organization, is attempting to acc...
Question 161: Which of the following statements is FALSE with respect to I...
Question 162: In the context of password security, a simple dictionary att...
Question 163: John, a disgruntled ex-employee of an organization, contacte...
Question 164: Gavin owns a white-hat firm and is performing a website secu...
Question 165: What is the first step for a hacker conducting a DNS cache p...
Question 166: Richard, an attacker, aimed to hack loT devices connected to...
Question 167: Gilbert, a web developer, uses a centralized web API to redu...
Question 168: There have been concerns in your network that the wireless n...
Question 169: Todd has been asked by the security officer to purchase a co...
Question 170: Kevin, an encryption specialist, implemented a technique tha...
Question 171: Cross-site request forgery involves:...
Question 172: When discussing passwords, what is considered a brute force ...
Question 173: You have compromised a server on a network and successfully ...
Question 174: As a securing consultant, what are some of the things you wo...
Question 175: What is the following command used for? net use \targetipc$ ...
Question 176: Heather's company has decided to use a new customer relation...
Question 177: Attacker Simon targeted the communication network of an orga...
Question 178: Tess King is using the nslookup command to craft queries to ...
Question 179: During an Xmas scan what indicates a port is closed?...
Question 180: Which of the following options represents a conceptual chara...
Question 181: What is correct about digital signatures?...
Question 182: in the Common Vulnerability Scoring System (CVSS) v3.1 sever...
Question 183: You are performing a penetration test for a client and have ...
Question 184: The tools which receive event logs from servers, network equ...
Question 185: What is the BEST alternative if you discover that a rootkit ...
Question 186: The collection of potentially actionable, overt, and publicl...
Question 187: An attacker, using a rogue wireless AP, performed an MITM at...
Question 188: Which of the following describes the characteristics of a Bo...
Question 189: Which of these is capable of searching for and locating rogu...
Question 190: Alice, a professional hacker, targeted an organization's clo...
Question 191: What does a firewall check to prevent particular ports and a...
Question 192: Jake, a professional hacker, installed spyware on a target i...
Question 193: Jack, a disgruntled ex-employee of Incalsol Ltd., decided to...
Question 194: infecting a system with malware and using phishing to gain c...
Question 195: When a normal TCP connection starts, a destination host rece...
Question 196: Taylor, a security professional, uses a tool to monitor her ...
Question 197: You are the Network Admin, and you get a complaint that some...
Question 198: Which results will be returned with the following Google sea...
Question 199: Abel, a cloud architect, uses container technology to deploy...
Question 200: What would you enter if you wanted to perform a stealth scan...
Question 201: A hacker is an intelligent individual with excellent compute...
Question 202: Daniel Is a professional hacker who Is attempting to perform...
Question 203: An attacker has installed a RAT on a host. The attacker want...
Question 204: What type of a vulnerability/attack is it when the malicious...
Question 205: In order to tailor your tests during a web-application scan,...
Question 206: You are tasked to configure the DHCP server to lease the las...
Question 207: Which Nmap option would you use if you were not concerned ab...