What is the difference between penetration testing and vulnerability testing?
What is the difference between penetration testing and vulnerability testing? A . Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’B . Penetration testing is based on purely online vulnerability analysis while vulnerability testing...
Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?
Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?A . DraftB . ReportC . Requirement listD . QuotationView AnswerAnswer: D
Which of the following methods is used to perform server discovery?
Which of the following methods is used to perform server discovery?A . Banner GrabbingB . Who is LookupC . SQL InjectionD . Session HijackingView AnswerAnswer: B
Where should Harold navigate on the computer to find the file?
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?A . %systemroot%LSAB . %systemroot%repairC . %systemroot%system32driversetcD . %systemroot%system32LSAView AnswerAnswer: B
What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?
What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?A . Server Side IncludesB . Sort Server IncludesC . Server Sort IncludesD . Slide Server IncludesView AnswerAnswer: A
Which of the following will not handle routing protocols properly?
Which of the following will not handle routing protocols properly?A . “Internet-router-firewall-net architecture”B . “Internet-firewall-router-net architecture”C . “Internet-firewall -net architecture”D . “Internet-firewall/router(edge device)-net architecture”View AnswerAnswer: B
Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?
Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?A . AESB . DES (ECB mode)C . MD5D . RC5View AnswerAnswer: C
What organization should Frank submit the log to find out if it is a new vulnerability or not?
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown...
If the destination is not reachable, which one of the following are generated?
Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs)...
Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?
War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks. Which one of the following is a Linux based program that...