Identify the type of attack performed by Thomas on the online shopping website?

Thomas is an attacker and he skimmed through the HTML source code of an online shopping website for the presence of any vulnerabilities that he can exploit. He already knows that when a user makes any selection of items in the online shopping webpage, the selection is typically stored as...

September 27, 2019 No Comments READ MORE +

Identify the type of attack being performed by the attacker?

An attacker targeted to attack network switches of an organization to steal confidential information such as network subscriber information, passwords, etc. He started transmitting data through one switch to another by creating and sending two 802.1Q tags, one for the attacking switch and the other for victim switch. By sending...

September 27, 2019 No Comments READ MORE +

Identify the type of cloud service deployed by the organization?

SecGlobal Corporation hired Michael, a penetration tester. Management asked Michael to perform cloud penetration testing on the company’s cloud infrastructure. As a part of his task, he started checking all the agreements with cloud service provider and came to a conclusion that it is not possible to perform penetration testing...

September 26, 2019 No Comments READ MORE +

Which of the following authentication protocols should Adam employ in order to achieve the objective?

Adam is an IT administrator for Syncan Ltd. He is designated to perform various IT tasks like setting up new user accounts, managing backup/restores, security authentications and passwords, etc. Whilst performing his tasks, he was asked to employ the latest and most secure authentication protocol to encrypt the passwords of...

September 24, 2019 No Comments READ MORE +

Which if the following Nmap commands should Peter execute to perform stealth scanning?

Peter, a disgruntled ex-employee of Zapmaky Solutions Ltd., is trying to jeopardize the company’s website http://zapmaky.com. He conducted the port scan of the website by using the Nmap tool to extract the information about open ports and their corresponding services. While performing the scan, he recognized that some of his...

September 23, 2019 No Comments READ MORE +

Which of the following RFID attacks Jamie has performed in the above scenario?

Tecty Motors Pvt. Ltd. has recently deployed RFID technology in the vehicles which allows the car owner to unlock the car with the exchange of a valid RFID signal between a reader and a tag. Jamie, on the other hand, is a hacker who decided to exploit this technology with...

September 19, 2019 No Comments READ MORE +

Sam was asked to conduct penetration tests on one of the client’s internal networks. As part of the testing process, Sam performed enumeration to gain information about computers belonging to a domain, list of shares on the individual hosts in the network, policies and passwords.

Sam was asked to conduct penetration tests on one of the client’s internal networks. As part of the testing process, Sam performed enumeration to gain information about computers belonging to a domain, list of shares on the individual hosts in the network, policies and passwords. Identify the enumeration technique.A ....

September 17, 2019 No Comments READ MORE +

Which among the following ports would you scan to identify this service during a penetration test?

The Finger service displays information such as currently logged-on users, email address, full name, etc. Which among the following ports would you scan to identify this service during a penetration test?A . Port 89B . Port 99C . Port 69D . Port 79View AnswerAnswer: D

September 17, 2019 No Comments READ MORE +

Based on this information, which among the following commands would you issue to view the NFS Shares running on the server?

While scanning a server, you found rpc, nfs and mountd services running on it. During the investigation, you were told that NFS Shares were mentioned in the /etc/exports list of the NFS server. Based on this information, which among the following commands would you issue to view the NFS Shares...

September 13, 2019 No Comments READ MORE +