What is the name of this technique to hide the code and extend analysis time?

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious Java scripts. After opening one of them, he noticed that it is very hard to understand the code and that all codes differ from the typical Java script. What is the name...

September 23, 2020 No Comments READ MORE +

Which of the below scanning technique will you use?

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?A...

September 23, 2020 No Comments READ MORE +

What protocol used on Linux servers to synchronize the time has stopped working?

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the...

September 22, 2020 No Comments READ MORE +

What services by default run on TCP port 123?

You perform a scan of your company’s network and discover that TCP port 123 is open. What services by default run on TCP port 123?A . TelnetB . POP3C . Network Time ProtocolD . DNSView AnswerAnswer: C

September 22, 2020 No Comments READ MORE +

Which one of the following tools the hacker probably used to inject HTML code?

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...

September 22, 2020 No Comments READ MORE +

Which three flags are set?

An attacker scans a host with the below command. Which three flags are set? (Choose three.) #nmap CsX host.domain.comA . This is ACK scan. ACK flag is setB . This is Xmas scan. SYN and ACK flags are setC . This is Xmas scan. URG, PUSH and FIN are setD...

September 22, 2020 No Comments READ MORE +

Which of the below hashing functions are not recommended for use?

Which of the below hashing functions are not recommended for use?A . SHA-1.ECCB . MD5, SHA-1C . SHA-2. SHA-3D . MD5. SHA-5View AnswerAnswer: A

September 22, 2020 No Comments READ MORE +

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Which protocol is used for setting up secure channels between two devices, typically in VPNs?A . PPPB . IPSECC . PEMD . SETView AnswerAnswer: B

September 22, 2020 No Comments READ MORE +

Which of the following act requires employer’s standard national numbers to identify them on standard transactions?

Which of the following act requires employer’s standard national numbers to identify them on standard transactions?A . SOXB . HIPAAC . DMCAD . PCI-DSSView AnswerAnswer: B

September 21, 2020 No Comments READ MORE +

Using Wire shark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the...

September 21, 2020 1 Comment READ MORE +