What is the name of this kind of attack?

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address....

June 10, 2021No CommentsREAD MORE +

Which of the following statement is incorrect related to this attack?

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to...

June 9, 2021No CommentsREAD MORE +

By using a smart card and pin, you are using a two-factor authentication that satisfies

By using a smart card and pin, you are using a two-factor authentication that satisfiesA . Something you are and something you rememberB . Something you have and something you knowC . Something you know and something you areD . Something you have and something you areView AnswerAnswer: B

June 9, 2021No CommentsREAD MORE +

Which system consists of a publicly available set of databases that contain domain name registration contact information?

Which system consists of a publicly available set of databases that contain domain name registration contact information?A . WHOISB . CAPTCHAC . IANAD . IETFView AnswerAnswer: A

June 9, 2021No CommentsREAD MORE +

What is the technique employed by John to bypass the firewall?

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique. John successfully injected malware to bypass a firewall and maintained communication with the victim...

June 9, 2021No CommentsREAD MORE +

During an Xmas scan what indicates a port is closed?

During an Xmas scan what indicates a port is closed?A . No return responseB . RSTC . ACKD . SYNView AnswerAnswer: B

June 9, 2021No CommentsREAD MORE +

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?A . AndroidManifest.xmlB . APC . infoD . resources.asrcE . classes.dexView AnswerAnswer: A Explanation: The AndroidManifest.xml file contains information of your package, including components of the appliance like activities, services, broadcast receivers,...

June 9, 2021No CommentsREAD MORE +

What is the attack performed on Don in the above scenario?

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on...

June 9, 2021No CommentsREAD MORE +

Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?

Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In the login/password form, you enter the following credentials: Username: attack' or 1=1 - Password: 123456 Based on the above credentials, which of the following SQL commands...

June 9, 2021No CommentsREAD MORE +

What will he do next?

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?A . He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.B . He will activate OSPF on the spoofed root...

June 9, 2021No CommentsREAD MORE +