Join the discussion
Question 1/137
What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?
Correct Answer: B
Add Comments
- Other Question (137q)
- Q1. What firewall evasion scanning technique make use of a zombie system that has low network ...
- Q2. Johnson, an attacker, performed online research for the contact details of reputed cyberse...
- Q3. Susan has attached to her company's network. She has managed to synchronize her boss's ses...
- Q4. Which file is a rich target to discover the structure of a website during web-server footp...
- Q5. Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to p...
- Q6. What is the proper response for a NULL scan if the port is closed?...
- Q7. Bob received this text message on his mobile phone: "Hello, this is Scott Smelby from the ...
- Q8. Bella, a security professional working at an it firm, finds that a security breach has occ...
- Q9. John, a security analyst working for an organization, found a critical vulnerability on th...
- Q10. Richard, an attacker, targets an MNC. in this process, he uses a footprinting technique to...
- Q11. A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP reques...
- Q12. Robin, a professional hacker, targeted an organization's network to sniff all the traffic....
- Q13. Which among the following is the best example of the hacking concept called "clearing trac...
- Q14. Which utility will tell you in real time which ports are listening or in another state?...
- Q15. What piece of hardware on a computer's motherboard generates encryption keys and only rele...
- Q16. An organization is performing a vulnerability assessment tor mitigating threats. James, a ...
- Q17. Richard, an attacker, aimed to hack loT devices connected to a target network. In this pro...
- Q18. Mason, a professional hacker, targets an organization and spreads Emotet malware through m...
- Q19. Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a ...
- Q20. While scanning with Nmap, Patin found several hosts which have the IP ID of incremental se...
- Q21. Juliet, a security researcher in an organization, was tasked with checking for the authent...
- Q22. Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into ...
- Q23. #!/usr/bin/python import socket buffer=[""A""] counter=50 while len(buffer)<=100: buffe...
- Q24. Joseph was the Web site administrator for the Mason Insurance in New York, who's main Web ...
- Q25. A technician is resolving an issue where a computer is unable to connect to the Internet u...
- Q26. E-mail scams and mail fraud are regulated by which of the following?...
- Q27. What is the known plaintext attack used against DES which gives the result that encrypting...
- Q28. Which of the following Metasploit post-exploitation modules can be used to escalate privil...
- Q29. Ricardo has discovered the username for an application in his targets environment. As he h...
- Q30. By performing a penetration test, you gained access under a user account. During the test,...
- Q31. There are multiple cloud deployment options depending on how isolated a customer's resourc...
- Q32. Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. ...
- Q33. Techno Security Inc. recently hired John as a penetration tester. He was tasked with ident...
- Q34. CyberTech Inc. recently experienced SQL injection attacks on its official website. The com...
- Q35. Richard, an attacker, aimed to hack loT devices connected to a target network. In this pro...
- Q36. What is the following command used for? sqlmap.py-u ,,http://10.10.1.20/?p=1&forumacti...
- Q37. What does a firewall check to prevent particular ports and applications from getting packe...
- Q38. Harper, a software engineer, is developing an email application. To ensure the confidentia...
- Q39. Attacker Steve targeted an organization's network with the aim of redirecting the company'...
- Q40. Which type of malware spreads from one system to another or from one network to another an...
- Q41. Becky has been hired by a client from Dubai to perform a penetration test against one of t...
- Q42. What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?...
- Q43. One of your team members has asked you to analyze the following SOA record. What is the ve...
- Q44. John, a professional hacker, decided to use DNS to perform data exfiltration on a target n...
- Q45. Garry is a network administrator in an organization. He uses SNMP to manage networked devi...
- Q46. What is the way to decide how a packet will move from an untrusted outside host to a prote...
- Q47. You went to great lengths to install all the necessary technologies to prevent hacking att...
- Q48. Which of the following tools are used for enumeration? (Choose three.)...
- Q49. Miley, a professional hacker, decided to attack a target organization's network. To perfor...
- Q50. Identify the web application attack where the attackers exploit vulnerabilities in dynamic...
- Q51. While scanning with Nmap, Patin found several hosts which have the IP ID of incremental se...
- Q52. When conducting a penetration test, it is crucial to use all means to get all available in...
- Q53. Attacker Simon targeted the communication network of an organization and disabled the secu...
- Q54. A group of hackers were roaming around a bank office building in a city, driving a luxury ...
- Q55. Stella, a professional hacker, performs an attack on web services by exploiting a vulnerab...
- Q56. Vlady works in a fishing company where the majority of the employees have very little unde...
- Q57. In order to tailor your tests during a web-application scan, you decide to determine which...
- Q58. Mary, a penetration tester, has found password hashes in a client system she managed to br...
- Q59. Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on hi...
- Q60. Taylor, a security professional, uses a tool to monitor her company's website, analyze the...
- Q61. The following is an entry captured by a network IDS. You are assigned the task of analyzin...
- Q62. As a securing consultant, what are some of the things you would recommend to a company to ...
- Q63. What is the file that determines the basic configuration (specifically activities, service...
- Q64. An organization has automated the operation of critical infrastructure from a remote locat...
- Q65. Richard, an attacker, aimed to hack loT devices connected to a target network. In this pro...
- Q66. Bob is doing a password assessment for one of his clients. Bob suspects that security poli...
- Q67. Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a ...
- Q68. While using your bank's online servicing you notice the following string in the URL bar: "...
- Q69. A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what riv...
- Q70. A penetration tester is conducting a port scan on a specific host. The tester found severa...
- Q71. Suppose that you test an application for the SQL injection vulnerability. You know that th...
- Q72. Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her c...
- Q73. What is the following command used for? sqlmap.py-u ,,http://10.10.1.20/?p=1&forumacti...
- Q74. Bob received this text message on his mobile phone: "Hello, this is Scott Smelby from the ...
- Q75. Given below are different steps involved in the vulnerability-management life cycle. 1) Re...
- Q76. what are common files on a web server that can be misconfigured and provide useful Informa...
- Q77. You start performing a penetration test against a specific website and have decided to sta...
- Q78. Morris, a professional hacker, performed a vulnerability scan on a target organization by ...
- Q79. Louis, a professional hacker, had used specialized tools or search engines to encrypt all ...
- Q80. Sam, a professional hacker. targeted an organization with intention of compromising AWS IA...
- Q81. An organization is performing a vulnerability assessment tor mitigating threats. James, a ...
- Q82. You need to deploy a new web-based software package for your organization. The package req...
- Q83. Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company....
- Q84. Louis, a professional hacker, had used specialized tools or search engines to encrypt all ...
- Q85. By using a smart card and pin, you are using a two-factor authentication that satisfies...
- Q86. What is the file that determines the basic configuration (specifically activities, service...
- Q87. John, a professional hacker, performs a network attack on a renowned organization and gain...
- Q88. Which Nmap option would you use if you were not concerned about being detected and wanted ...
- Q89. John, a professional hacker, decided to use DNS to perform data exfiltration on a target n...
- Q90. A large company intends to use Blackberry for corporate mobile phones and a security analy...
- Q91. Which definition among those given below best describes a covert channel?...
- Q92. Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's...
- Q93. This form of encryption algorithm is a symmetric key block cipher that is characterized by...
- Q94. Garry is a network administrator in an organization. He uses SNMP to manage networked devi...
- Q95. Clark is a professional hacker. He created and configured multiple domains pointing to the...
- Q96. While using your bank's online servicing you notice the following string in the URL bar: "...
- Q97. Shiela is an information security analyst working at HiTech Security Solutions. She is per...
- Q98. The following is an entry captured by a network IDS. You are assigned the task of analyzin...
- Q99. An organization has automated the operation of critical infrastructure from a remote locat...
- Q100. An attacker changes the profile information of a particular user (victim) on the target we...
- Q101. which type of virus can change its own code and then cipher itself multiple times as it re...
- Q102. John is investigating web-application firewall logs and observers that someone is attempti...
- Q103. BitLocker encryption has been implemented for all the Windows-based computers in an organi...
- Q104. What is the proper response for a NULL scan if the port is open?...
- Q105. Thomas, a cloud security professional, is performing security assessment on cloud services...
- Q106. Henry Is a cyber security specialist hired by BlackEye - Cyber security solutions. He was ...
- Q107. An attacker scans a host with the below command. Which three flags are set? # nmap -sX hos...
- Q108. What does the following command in netcat do? nc -l -u -p55555 < /etc/passwd...
- Q109. what is the port to block first in case you are suspicious that an loT device has been com...
- Q110. Annie, a cloud security engineer, uses the Docker architecture to employ a client/server m...
- Q111. An Internet Service Provider (ISP) has a need to authenticate users connecting via analog ...
- Q112. Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to t...
- Q113. Jim's company regularly performs backups of their critical servers. But the company cannot...
- Q114. Which of the following Google advanced search operators helps an attacker in gathering inf...
- Q115. Ricardo has discovered the username for an application in his target's environment. As he ...
- Q116. What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/T...
- Q117. Kevin, a professional hacker, wants to penetrate CyberTech Inc.'s network. He employed a t...
- Q118. What type of analysis is performed when an attacker has partial knowledge of inner-working...
- Q119. Mirai malware targets loT devices. After infiltration, it uses them to propagate and creat...
- Q120. Eve is spending her day scanning the library computers. She notices that Alice is using a ...
- Q121. Morris, a professional hacker, performed a vulnerability scan on a target organization by ...
- Q122. What piece of hardware on a computer's motherboard generates encryption keys and only rele...
- Q123. Jim, a professional hacker, targeted an organization that is operating critical Industrial...
- Q124. jane, an ethical hacker. Is testing a target organization's web server and website to iden...
- Q125. A new wireless client is configured to join a 802.11 network. This client uses the same ha...
- Q126. Which of the following options represents a conceptual characteristic of an anomaly-based ...
- Q127. You are tasked to perform a penetration test. While you are performing information gatheri...
- Q128. Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was design...
- Q129. Bob is doing a password assessment for one of his clients. Bob suspects that security poli...
- Q130. You have been authorized to perform a penetration test against a website. You want to use ...
- Q131. When you are getting information about a web server, it is very important to know the HTTP...
- Q132. An organization is performing a vulnerability assessment tor mitigating threats. James, a ...
- Q133. You are a Network Security Officer. You have two machines. The first machine (192.168.0.99...
- Q134. what is the port to block first in case you are suspicious that an loT device has been com...
- Q135. Samuel, a professional hacker, monitored and intercepted already established traffic betwe...
- Q136. Attacker Rony installed a rogue access point within an organization's perimeter and attemp...
- Q137. infecting a system with malware and using phishing to gain credentials to a system or web ...
