infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?A . ReconnaissanceB . Maintaining accessC . ScanningD . Gaining accessView AnswerAnswer: D Explanation: This phase having the hacker uses different techniques and tools...

June 10, 2021 No Comments READ MORE +

A zone file consists of which of the following Resource Records (RRs)?

A zone file consists of which of the following Resource Records (RRs)?A . DNS, NS, AXFR, and MX recordsB . DNS, NS, PTR, and MX recordsC . SOA, NS, AXFR, and MX recordsD . SOA, NS, A, and MX recordsView AnswerAnswer: D

June 10, 2021 No Comments READ MORE +

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....

June 10, 2021 No Comments READ MORE +

What is the online tool employed by Clark in the above scenario?

Clark, a professional hacker, was hired by an organization lo gather sensitive Information about its competitors surreptitiously. Clark gathers the server IP address of the target organization using Whole footprinting. Further, he entered the server IP address as an input to an online tool to retrieve information such as the...

June 10, 2021 No Comments READ MORE +

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-A . VCloud basedB . Honypot basedC . Behaviour basedD . Heuristics basedView AnswerAnswer: A

June 10, 2021 No Comments READ MORE +

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?A . Produces less false positivesB . Can identify unknown attacksC . Requires vendor updates for a new threatD . Cannot deal with encrypted network trafficView AnswerAnswer: B

June 10, 2021 No Comments READ MORE +

What type of breach has the individual just performed?

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?A . Reverse Social EngineeringB . TailgatingC . PiggybackingD . AnnouncedView AnswerAnswer: B

June 10, 2021 No Comments READ MORE +

How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?

You have the SOA presented below in your Zone. Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries? collegae.edu.SOA, cikkye.edu...

June 10, 2021 No Comments READ MORE +

From the following options choose how best you can achieve this objective?

While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the...

June 10, 2021 1 Comment READ MORE +

what are common files on a web server that can be misconfigured and provide useful Information for a hacker such as verbose error messages?

what are common files on a web server that can be misconfigured and provide useful Information for a hacker such as verbose error messages?A . httpd.confB . administration.configC . idq.dllD . php.iniView AnswerAnswer: D Explanation: The php.ini file may be a special file for PHP. it’s where you declare changes...

June 10, 2021 No Comments READ MORE +