What flag will you use to satisfy this requirement?

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: “The attacker must scan every port on the server several times using a set of spoofed sources IP...

June 6, 2021 1 Comment READ MORE +

What sort of security breach is this policy attempting to mitigate?

A company’s security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?A . Attempts by attackers to access the user and password information stored in the company’s SQL database.B . Attempts by attackers...

June 5, 2021 No Comments READ MORE +

In what kind of system would you find the following string of characters used as a rule within its configuration?

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTableB . FTP Server ruleC...

June 5, 2021 No Comments READ MORE +

Which of the following Nmap commands must John use to perform the TCP SVN ping scan?

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of...

June 5, 2021 No Comments READ MORE +

Which of the following is this type of solution?

Heather’s company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the...

June 5, 2021 No Comments READ MORE +

How do you prevent DNS spoofing?

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable...

June 5, 2021 No Comments READ MORE +

What is the attack performed on Don in the above scenario?

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on...

June 5, 2021 No Comments READ MORE +

What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?A . Service Level AgreementB ....

June 5, 2021 No Comments READ MORE +

Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accounting

Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accountingA . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.B . Results matching all words in the query.C . Results for matches on target.com...

June 5, 2021 No Comments READ MORE +

What happens when the CAM table becomes full?

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch. In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses...

June 5, 2021 No Comments READ MORE +