In what default directory (fully qualified path) does nmap store scripts?
In what default directory (fully qualified path) does nmap store scripts?A . /usr/share/scriptsB . /ust/share/nmap/scriptsC . /usr/share/nmapD . /optView AnswerAnswer: C Explanation: Nmap (Network Mapper) is a network scanning and security auditing tool. Scripts used by Nmap for performing different network discovery and security auditing tasks are stored in /usr/share/nmap/scripts....
How many main score areas are there in the CVSS?2
How many main score areas are there in the CVSS?2A . 2B . 4C . 3D . None of theseView AnswerAnswer: C Explanation: The Common Vulnerability Scoring System (CVSS) is a framework for rating the severity of security vulnerabilities. CVSS provides three main score areas: Base, Temporal, and Environmental. Base...
What type of communication protocol does Modbus RTU use?
What type of communication protocol does Modbus RTU use?A . UDPB . ICMPC . SerialD . SSTPView AnswerAnswer: C Explanation: Modbus RTU (Remote Terminal Unit) is a communication protocol based on a master-slave architecture that uses serial communication. It is one of the earliest communication protocols developed for devices connected...
The vulnerability that led to the WannaCry ransomware infections affected which protocol?
The vulnerability that led to the WannaCry ransomware infections affected which protocol?A . SambaB . None of theseC . RPCD . SMBView AnswerAnswer: D Explanation: WannaCry is a ransomware attack that spread rapidly across multiple computer networks in May 2017. The vulnerability exploited by the WannaCry ransomware was in the...
Which of the following components is not part of the Authentication Header (AH)?
Which of the following components is not part of the Authentication Header (AH)?A . ReplayB . AuthenticationC . ConfidentialityD . IntegrityView AnswerAnswer: C Explanation: The Authentication Header (AH) is a component of the IPsec protocol suite that provides authentication and integrity to the communications. AH ensures that the contents of...
Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?
Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?A . 4B . 3C . 1D . 2View AnswerAnswer: B Explanation: IEC 62443 is an international series of standards on Industrial communication networks and system security, specifically related to Industrial Automation and Control Systems (IACS). Within the...
Which component of the IT Security Model is attacked with masquerade?
Which component of the IT Security Model is attacked with masquerade?A . IntegrityB . AvailabilityC . ConfidentialityD . AuthenticationView AnswerAnswer: D Explanation: A masquerade attack involves an attacker pretending to be an authorized user of a system, thus compromising the authentication component of the IT security model. Authentication ensures that...
What is the size of the AH in bits with respect to width?
What is the size of the AH in bits with respect to width?A . 24B . 43C . 16D . 32View AnswerAnswer: D Explanation: The Authentication Header (AH) in the context of IPsec has a fixed header portion of 24 bits and a mutable part that can vary, but when...
Which of the hacking methodology steps can be used to identify the applications and vendors used?
Which of the hacking methodology steps can be used to identify the applications and vendors used?A . EnumerationB . OSINTC . ScanningD . SurveillanceView AnswerAnswer: B Explanation: OSINT (Open Source Intelligence) refers to the collection and analysis of information gathered from public, freely available sources to be used in an...
Which of the following can be used to view entire copies of web sites?
Which of the following can be used to view entire copies of web sites?A . Wayback machineB . Google CacheC . NetcraftD . Bing offlineView AnswerAnswer: A Explanation: The Wayback Machine is an internet service provided by the Internet Archive that allows users to see archived versions of web pages...