What do you want to “know” to prove yourself that it was Bob who had send a mail?

Bob, your senior colleague, has sent you a mail regarding aa deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to “know” to prove yourself that it...

January 2, 2019 No Comments READ MORE +

Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). Which of the following is an incorrect definition or characteristics of the protocol?

Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). Which of the following is an incorrect definition or characteristics of the protocol?A . Based on XMLB . Only compatible with the application protocol HTTPC . Exchanges data between web servicesD . Provides a...

December 29, 2018 No Comments READ MORE +

Which is the first step followed by Vulnerability Scanners for scanning a network?

Which is the first step followed by Vulnerability Scanners for scanning a network?A . TCP/UDP Port scanningB . Firewall detectionC . OS DetectionD . Checking if the remote host is aliveView AnswerAnswer: D

December 28, 2018 No Comments READ MORE +

What is the best way to evade the NIDS?

You have successfully gained access to a Linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by Network-Based Intrusion Detection Systems (NIDS). What is the best way to evade the NIDS?A . Out of band signalingB . Protocol IsolationC ....

December 18, 2018 No Comments READ MORE +

PGP, SSL, and IKE are all examples of which type of cryptography?

PGP, SSL, and IKE are all examples of which type of cryptography?A . Hash AlgorithmB . DigestC . Secret KeyD . Public KeyView AnswerAnswer: D

December 16, 2018 No Comments READ MORE +

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?A . BluesmackingB . BluesniffingC . BluesnarfingD . BluejackingView AnswerAnswer: D

December 2, 2018 No Comments READ MORE +

Which of the following is the BEST way to defend against network sniffing?

Which of the following is the BEST way to defend against network sniffing?A . Restrict Physical Access to Server Rooms hosting Critical ServersB . Use Static IP AddressC . Using encryption protocols to secure network communicationsD . Register all machines MAC Address in a Centralized DatabaseView AnswerAnswer: C

November 28, 2018 No Comments READ MORE +

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; --‘; which type of SQL injection attack is the attacker performing?

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; --‘; which type of SQL injection attack is the attacker performing?A . End of Line CommentB . UNION SQL InjectionC . Illegal/Logically Incorrect QueryD . TautologyView AnswerAnswer: D

November 28, 2018 1 Comment READ MORE +

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?A . Reverse Social EngineeringB . TailgatingC . PiggybackingD . AnnouncedView AnswerAnswer: B

November 24, 2018 No Comments READ MORE +

What would you enter, if you wanted to perform a stealth scan using Nmap?

What would you enter, if you wanted to perform a stealth scan using Nmap?A . nmap -sUB . nmap -sSC . nmap -sMD . nmap -sTView AnswerAnswer: B

November 22, 2018 No Comments READ MORE +