What is the proper response for a NULL scan if the port is closed?

What is the proper response for a NULL scan if the port is closed?A . SYNB . ACKC . FIND . PSHE . RSTF . No responseView AnswerAnswer: E

June 15, 20211 CommentREAD MORE +

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . SFTPB . IpsecC . SSLD . FTPSView AnswerAnswer: B

June 15, 2021No CommentsREAD MORE +

Which of the following is assured by the use of a hash?

Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D

June 14, 2021No CommentsREAD MORE +

What kind of hackers are we talking about?

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?A . Black-Hat Hackers AB . Script KiddiesC . White-Hat HackersD . Gray-Hat HackerView AnswerAnswer: B Explanation: Script Kiddies: These hackers have limited or no training...

June 14, 2021No CommentsREAD MORE +

What is the technique employed by John to bypass the firewall?

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique. John successfully injected malware to bypass a firewall and maintained communication with the victim...

June 14, 2021No CommentsREAD MORE +

Which of the following is an extremely common IDS evasion technique in the web world?

Which of the following is an extremely common IDS evasion technique in the web world?A . SpywareB . SubnettingC . Unicode CharactersD . Port KnockingView AnswerAnswer: C

June 14, 2021No CommentsREAD MORE +

Which TCP and UDP ports must you filter to check null sessions on your network?

Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?A . 137 and 139B . 137 and 443C . 139 and 443D . 139 and 445View AnswerAnswer: D

June 14, 2021No CommentsREAD MORE +

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?A . network SnifferB . Vulnerability ScannerC . Intrusion prevention ServerD . Security incident and event MonitoringView AnswerAnswer: D

June 14, 2021No CommentsREAD MORE +

Which of the following is being described?

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?A . Multi-cast modeB . Promiscuous modeC . WEMD...

June 14, 2021No CommentsREAD MORE +

What seems to be wrong?

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through. invictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24...

June 14, 2021No CommentsREAD MORE +