What is the proper response for a NULL scan if the port is closed?
What is the proper response for a NULL scan if the port is closed?A . SYNB . ACKC . FIND . PSHE . RSTF . No responseView AnswerAnswer: E
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . SFTPB . IpsecC . SSLD . FTPSView AnswerAnswer: B
Which of the following is assured by the use of a hash?
Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D
What kind of hackers are we talking about?
These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?A . Black-Hat Hackers AB . Script KiddiesC . White-Hat HackersD . Gray-Hat HackerView AnswerAnswer: B Explanation: Script Kiddies: These hackers have limited or no training...
What is the technique employed by John to bypass the firewall?
John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique. John successfully injected malware to bypass a firewall and maintained communication with the victim...
Which of the following is an extremely common IDS evasion technique in the web world?
Which of the following is an extremely common IDS evasion technique in the web world?A . SpywareB . SubnettingC . Unicode CharactersD . Port KnockingView AnswerAnswer: C
Which TCP and UDP ports must you filter to check null sessions on your network?
Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?A . 137 and 139B . 137 and 443C . 139 and 443D . 139 and 445View AnswerAnswer: D
The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?
The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?A . network SnifferB . Vulnerability ScannerC . Intrusion prevention ServerD . Security incident and event MonitoringView AnswerAnswer: D
Which of the following is being described?
The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?A . Multi-cast modeB . Promiscuous modeC . WEMD...
What seems to be wrong?
You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through. invictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24...