Which of the following actions should John take to overcome this problem with the least administrative effort?

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to...

June 14, 2021No CommentsREAD MORE +

What would Yancey be considered?

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the...

June 13, 2021No CommentsREAD MORE +

Which of the following is not a Bluetooth attack?

Which of the following is not a Bluetooth attack?A . BluedrivingB . BluesmackingC . BluejackingD . BluesnarfingView AnswerAnswer: A

June 13, 2021No CommentsREAD MORE +

You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log.

You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log. Which file does NOT belongs to the list:A . user.logB . auth.fesgC . wtmpD . btmpView AnswerAnswer: C

June 13, 20212 CommentsREAD MORE +

What is the attack performed on Don in the above scenario?

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on...

June 13, 20212 CommentsREAD MORE +

What is the technique employed by John to bypass the firewall?

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique. John successfully injected malware to bypass a firewall and maintained communication with the victim...

June 13, 2021No CommentsREAD MORE +

What is the type of attack performed by Samuel in the above scenario?

Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got...

June 13, 2021No CommentsREAD MORE +

If these switches' ARP cache is successfully flooded, what will be the result?

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?A . The switches will drop into hub mode if the ARP cache is successfully flooded.B...

June 12, 2021No CommentsREAD MORE +

What is the hexadecimal value of NOP instruction?

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c What is the hexadecimal value of NOP instruction?A . 0x60B . 0x80C . 0x70D . 0x90View AnswerAnswer: D

June 12, 2021No CommentsREAD MORE +

What kind of attack is possible in this scenario?

While testing a web application in development, you notice that the web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder structure of the server. What kind of attack is possible in this scenario?A . Cross-site scriptingB ....

June 12, 2021No CommentsREAD MORE +