Which file does the attacker need to modify?

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?A . Boot.iniB . SudoersC . NetworksD . HostsView AnswerAnswer: D

April 15, 2025 No Comments READ MORE +

“http: // www. MyPersonalBank. com/ account?

While using your bank’s online servicing you notice the following string in the URL bar: “http: // www. MyPersonalBank. com/ account?id=368940911028389&Damount=10980&Camount=21” You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes. Which type of vulnerability is...

April 14, 2025 No Comments READ MORE +

Which hacking process is Peter doing?

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?A . ScanningB . FootprintingC . EnumerationD . System HackingView AnswerAnswer: B

April 13, 2025 No Comments READ MORE +

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520. What type of key does this bug leave exposed to the Internet making...

April 12, 2025 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

April 12, 2025 No Comments READ MORE +

Why should the security analyst disable/remove unnecessary ISAPI filters?

Why should the security analyst disable/remove unnecessary ISAPI filters?A . To defend against social engineering attacksB . To defend against webserver attacksC . To defend against jailbreakingD . To defend against wireless attacksView AnswerAnswer: B

April 12, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

April 12, 2025 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS DetectionB . Firewall detectionC . TCP/UDP Port scanningD . Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:

April 11, 2025 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

April 11, 2025 No Comments READ MORE +

Which of the following Linux commands will resolve a domain name into IP address?

Which of the following Linux commands will resolve a domain name into IP address?A . >host-t a hackeddomain.comB . >host-t ns hackeddomain.comC . >host -t soa hackeddomain.comD . >host -t AXFR hackeddomain.comView AnswerAnswer: A

April 9, 2025 No Comments READ MORE +