What is this type of rootkit an example of?
To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?A . Mypervisor rootkitB . Kernel toolkitC . Hardware rootkitD . Firmware rootkitView AnswerAnswer: B Explanation: Kernel-mode rootkits run...
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?A . Residual riskB . Impact riskC . Deferred riskD . Inherent riskView AnswerAnswer: A
Why containers are less secure that virtual machines?
Why containers are less secure that virtual machines?A . Host OS on containers has a larger surface attack.B . Containers may full fill disk space of the host.C . A compromise container may cause a CPU starvation of the host.D . Containers are attached to the same virtual network.View AnswerAnswer:...
Which of the following is a low-tech way of gaining unauthorized access to systems?
Which of the following is a low-tech way of gaining unauthorized access to systems?A . Social EngineeringB . EavesdroppingC . ScanningD . SniffingView AnswerAnswer: A
What is the TTL?
One of your team members has asked you to analyze the following SOA record. What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)A . 200303028B . 3600C . 604800D . 2400E . 60F . 4800View AnswerAnswer: D
What do you think Tess King is trying to accomplish?
Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain. What do you think Tess King is trying to...
What testing method did you use?
You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with...
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...
Which method of password cracking takes the most time and effort?
Which method of password cracking takes the most time and effort?A . Dictionary attackB . Shoulder surfingC . Rainbow tablesD . Brute forceView AnswerAnswer: D
What is the following command used for?
What is the following command used for? net use targetipc$ "" /u:""A . Grabbing the etc/passwd fileB . Grabbing the SAMC . Connecting to a Linux computer through Samba.D . This command is used to connect as a null sessionE . Enumeration of Cisco routersView AnswerAnswer: D