Which of the following tactics uses malicious code to redirect users' web traffic?

Which of the following tactics uses malicious code to redirect users' web traffic?A . SpimmingB . PharmingC . PhishingD . Spear-phishingView AnswerAnswer: B

September 20, 2021No CommentsREAD MORE +

Study the following log extract and identify the attack.

Study the following log extract and identify the attack. A . Hexcode AttackB . Cross Site ScriptingC . Multiple Domain Traversal AttackD . Unicode Directory Traversal AttackView AnswerAnswer: D

September 20, 2021No CommentsREAD MORE +

Which of the following techniques is described in the above scenario?

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced . Which of...

September 19, 2021No CommentsREAD MORE +

Which results will be returned with the following Google search query?

Which results will be returned with the following Google search query? site:target.com C site: Marketing.target.com accountingA . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.B . Results matching all words in the query.C . Results for matches on...

September 19, 2021No CommentsREAD MORE +

What is this attack called?

in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values . What...

September 19, 2021No CommentsREAD MORE +

What is this type of rootkit an example of?

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system . What is this type of rootkit an example of?A . Mypervisor rootkitB . Kernel toolkitC . Hardware rootkitD . Firmware rootkitView AnswerAnswer: B Explanation: Kernel-mode rootkits...

September 19, 2021No CommentsREAD MORE +

Which of the following tools is used by Jack to perform vulnerability scanning?

Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target...

September 19, 2021No CommentsREAD MORE +

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?A . BirthdayB . Brute forceC . Man-in-the-middleD . SmurfView AnswerAnswer: B

September 19, 2021No CommentsREAD MORE +

The time a hacker spends performing research to locate this information about a company is known as?

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President,...

September 19, 2021No CommentsREAD MORE +

CORRECT TEXT

CORRECT TEXT A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network . What isA . this hacking process known as?B . GPS mappingC ....

September 19, 2021No CommentsREAD MORE +