Which of the following cloud attacks did Alice perform in the above scenario?

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data,...

September 21, 2021No CommentsREAD MORE +

How can Fred accomplish this?

Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer . How can Fred accomplish this?A . Fred can accomplish this by...

September 21, 2021No CommentsREAD MORE +

What did the following commands determine?

What did the following commands determine? A . That the Joe account has a SID of 500B . These commands demonstrate that the guest account has NOT been disabledC . These commands demonstrate that the guest account has been disabledD . That the true administrator is JoeE . Issued alone,...

September 21, 2021No CommentsREAD MORE +

What is the type of spyware that Jake used to infect the target device?

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages . What is the type...

September 21, 2021No CommentsREAD MORE +

VPNs?

Which protocol is used for setting up secure channels between two devices, typically in VPNs?A . PEMB . pppC . IPSECD . SETView AnswerAnswer: C

September 21, 2021No CommentsREAD MORE +

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . SFTPB . IpsecC . SSLD . FTPSView AnswerAnswer: B

September 21, 2021No CommentsREAD MORE +

What hacking attack is challenge/response authentication used to prevent?

What hacking attack is challenge/response authentication used to prevent?A . Replay attacksB . Scanning attacksC . Session hijacking attacksD . Password cracking attacksView AnswerAnswer: A

September 21, 2021No CommentsREAD MORE +

What is the attack performed in the above scenario?

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was...

September 21, 20211 CommentREAD MORE +

How will you achieve this without raising suspicion?

You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet ....

September 21, 2021No CommentsREAD MORE +

Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.

Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.A . Protect the payload and the headersB . EncryptC . Work at the Data Link LayerD . AuthenticateView AnswerAnswer: D

September 20, 20211 CommentREAD MORE +