Join the discussion
Question 1/363
Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and 192.168.116.101. What factual conclusion can the tester draw from this output?


Correct Answer: C
Section: Volume A
Add Comments
- Other Question (363q)
- Q1. Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and 192.168.116....
- Q2. You suspect that a firewall or IPS exists between you and the target machine. Which nmap o...
- Q3. Which of the following methods can be used to detect session hijacking attack?...
- Q4. Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE8...
- Q5. You execute the following netcat command: c:\target\nc -1 -p 53 -d -e cmd.exe What action ...
- Q6. Which of the following describes the direction of the challenges issued when establishing ...
- Q7. As pan or a penetration lest, your team is tasked with discovering vulnerabilities that co...
- Q8. Which of the following federal laws are related to hacking activities? Each correct answer...
- Q9. Which of the following best describes a client side exploit?...
- Q10. Which of the following attacks allows the bypassing of access control lists on servers or ...
- Q11. What problem occurs when executing the following command from within a netcat raw shell? s...
- Q12. What is the purpose of the following command? C:\>wmic /node:[target IP] /user:[admin-u...
- Q13. You successfully compromise a target system's web application using blind command injectio...
- Q14. A penetration tester wishes to stop the Windows Firewall process on a remote host running ...
- Q15. Analyze the screenshot below. What type of vulnerability is being attacked? (Exhibit)...
- Q16. A tester has been contracted to perform a penetration test for a corporate client. The sco...
- Q17. Which of the following tools is an automated tool that is used to implement SQL injections...
- Q18. You have received a file named new.com in your email as an attachment. When you execute th...
- Q19. Which of the following tools allow you to perform HTTP tunneling? Each correct answer repr...
- Q20. Which of the following is the feature that separates the use of Rainbow Tables from other ...
- Q21. Which of the following tools monitors the radio spectrum for the presence of unauthorized,...
- Q22. Which of the following tools can be used by a user to hide his identity? Each correct answ...
- Q23. Which of the following is the JavaScript variable used to store a cookie?...
- Q24. What happens when you scan a broadcast IP address of a network? Each correct answer repres...
- Q25. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
- Q26. You work as a Network Administrator in the Secure Inc. You often need to send PDF document...
- Q27. Which of the following ports must you filter to check null sessions on your network?...
- Q28. Which of the following tools can be used for session splicing attacks?...
- Q29. What concept do Rainbow Tables use to speed up password cracking?...
- Q30. You want to run the nmap command that includes the host specification of 202.176.56-57.*. ...
- Q31. You have connected to a Windows system remotely and have shell access via netcat. While co...
- Q32. How can web server logs be leveraged to perform Cross-Site Scripting (XSSI?...
- Q33. TCP/IP stack fingerprinting is the passive collection of configuration attributes from a r...
- Q34. You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly ...
- Q35. If a password is seven characters or less, the second half of the LM hash is always ______...
- Q36. Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymi...
- Q37. While performing a code audit, you discover a SQL injection vulnerability assuming the fol...
- Q38. Which of the following tools allow you to perform HTTP tunneling? Each correct answer repr...
- Q39. You suspect that a firewall or IPS exists between you and the target machine. Which nmap o...
- Q40. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
- Q41. Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WL...
- Q42. You want to retrieve the default security report of nessus. Which of the following google ...
- Q43. Which of the following enables an inventor to legally enforce his right to exclude others ...
- Q44. Which of the following is a WEP weakness that makes it easy to Inject arbitrary clear text...
- Q45. In the screen shot below, which selections would you need click in order to intercept and ...
- Q46. SIMULATION Fill in the blank with the appropriate act name. The___ act gives consumers the...
- Q47. How many bits encryption does SHA-1 use?
- Q48. What is the purpose of the following command? C:\>wmic /node:[target IP] /user:[admin-u...
- Q49. In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entir...
- Q50. Which of the following tools allows you to download World Wide Web sites from the Internet...
- Q51. You have inserted a Trojan on your friend's computer and you want to put it in the startup...
- Q52. You successfully compromise a target system's web application using blind command injectio...
- Q53. Analyze the command output below. Given this information, which is the appropriate next st...
- Q54. You enter the following URL on your Web browser: http://www.we-are-secure.com/scripts/..%c...
- Q55. You have connected to a Windows system remotely and have shell access via netcat. While co...
- Q56. Which of the following United States laws protects stored electronic information?...
- Q57. Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized ar...
- Q58. You are using the dsniff tool to intercept communications between two entities and establi...
- Q59. You want to perform passive footprinting against we-are-secure Inc. Web server. Which of t...
- Q60. You want to connect to your friend's computer and run a Trojan on it. Which of the followi...
- Q61. Which of the following tools connects to and executes files on remote systems?...
- Q62. John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a ...
- Q63. John, a novice web user, makes a new E-mail account and keeps his password as "apple", his...
- Q64. You are running a vulnerability scan on a remote network and the traffic Is not making It ...
- Q65. You run the rdisk /s command to retrieve the backup SAM file on a computer. Where should y...
- Q66. You work as a Network Penetration tester in the Secure Inc. Your company takes the project...
- Q67. How does OWASP ZAP function when used for performing web application assessments?...
- Q68. You run the rdisk /s command to retrieve the backup SAM file on a computer. Where should y...
- Q69. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q70. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q71. You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you...
- Q72. Which of the following tools is an example of HIDS?...
- Q73. Which of the following tools can be used to perform Windows password cracking, Windows enu...
- Q74. You are performing a vulnerability assessment using Nessus and your clients printers begin...
- Q75. When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do ...
- Q76. Which of the following is the correct sequence of packets to perform the 3-way handshake m...
- Q77. Which of the following is generally practiced by the police or any other recognized govern...
- Q78. You run the following bash script in Linux: for i in 'cat hostlist.txt' ;do nc -q 2 -v $i ...
- Q79. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q80. Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blog...
- Q81. Which Metasploitvncinject stager will allow VNC communications from the attacker to a list...
- Q82. Which of the following are the two different file formats in which Microsoft Outlook saves...
- Q83. You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffi...
- Q84. In which of the following scanning techniques does a scanner connect to an FTP server and ...
- Q85. Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Pr...
- Q86. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
- Q87. Which of the following functions can be used as a countermeasure to a Shell Injection atta...
- Q88. ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch ...
- Q89. Which of the following tools uses exploits to break into remote operating systems?...
- Q90. When sniffing wireless frames, the interface mode plays a key role in successfully collect...
- Q91. Which of the following best explains why you would warn to clear browser slate (history. c...
- Q92. You want to create a binary log file using tcpdump. Which of the following commands will y...
- Q93. You want to find out what ports a system is listening on. What Is the correct command on a...
- Q94. You are pen testing a Linux target from your windows-based attack platform. You just moved...
- Q95. You have gained shell on a Windows host and want to find other machines to pivot to, but t...
- Q96. You are concerned about rogue wireless access points being connected to your network. What...
- Q97. You want to perform an active session hijack against Secure Inc. You have found a target t...
- Q98. You execute the following netcat command: c:\target\nc -1 -p 53 -d -e cmd.exe What action ...
- Q99. You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you...
- Q100. You want to retrieve password files (stored in the Web server's index directory) from vari...
- Q101. TCP/IP stack fingerprinting is the passive collection of configuration attributes from a r...
- Q102. TCP/IP stack fingerprinting is the passive collection of configuration attributes from a r...
- Q103. You've been asked to test a non-transparent proxy lo make sure it is working. After confir...
- Q104. Which of the following security policies will you implement to keep safe your data when yo...
- Q105. Which of the following TCP flags shows that the system is forwarding the buffered data?...
- Q106. In the screen shot below, which selections would you need click in order to intercept and ...
- Q107. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q108. Which of the following Trojans does not use TCP protocol?...
- Q109. A pen tester is able to pull credential information from memory on a Windows system. Based...
- Q110. You have connected to a Windows system remotely and have shell access via netcat. While co...
- Q111. Which of the following types of cyber stalking damage the reputation of their victim and t...
- Q112. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q113. You run the following PHP script: <?php $name = mysql_real_escape_string($_POST["name"]...
- Q114. Which of the following is generally practiced by the police or any other recognized govern...
- Q115. John works as a professional Ethical Hacker. He is assigned a project to test the security...
- Q116. Which of the following nmap switches is used to perform ICMP netmask scanning?...
- Q117. You are running a vulnerability scan on a remote network and the traffic Is not making It ...
- Q118. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q119. Which of the following tools is used for the 802.11 HTTP, HTTPS based MITM attacks?...
- Q120. You want to connect to your friend's computer and run a Trojan on it. Which of the followi...
- Q121. CORRECT TEXT Fill in the blank with the appropriate tool. ____scans IP networks for NetBIO...
- Q122. You are pen testing a system and want to use Metasploit 3.X to open a listening port on th...
- Q123. What does TCSEC stand for?
- Q124. Which of the following are considered Bluetooth security violations? Each correct answer r...
- Q125. Which of the following TCP packet sequences are common during a SYN (or half-open) scan? (...
- Q126. You send SYN packets with the exact TTL of the target system starting at port 1 and going ...
- Q127. What difference would you expect to result from running the following commands; (I). S dig...
- Q128. Which of the following attacks allows an attacker to sniff data frames on a local area net...
- Q129. Which of the following modes describes a wireless interface that is configured to passivel...
- Q130. Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized ar...
- Q131. You have been contracted to map me network and try to compromise the servers for a client....
- Q132. Which of the following tools is used for vulnerability scanning and calls Hydra to launch ...
- Q133. You are conducting a penetration test for a private company located in the UK. The scope e...
- Q134. Which Metasploitvncinject stager will allow VNC communications from the attacker to a list...
- Q135. Which of the following is the correct syntax to create a null session?...
- Q136. A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulne...
- Q137. Which of the following password cracking attacks is based on a pre-calculated hash table t...
- Q138. You want to perform an active session hijack against Secure Inc. You have found a target t...
- Q139. A penetration tester wishes to stop the Windows Firewall process on a remote host running ...
- Q140. In which of the following scanning methods do Windows operating systems send only RST pack...
- Q141. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q142. SIMULATION Write the appropriate attack name to fill in the blank. In a _____________ DoS ...
- Q143. Which of the following tools is spyware that makes Windows clients send their passwords as...
- Q144. You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthori...
- Q145. What will the following scapy commands do? (Exhibit)...
- Q146. You are concerned about war driving bringing hackers attention to your wireless network. W...
- Q147. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
- Q148. What does APNIC stand for?
- Q149. A client with 7200 employees in 14 cities (all connected via high speed WAN connections) h...
- Q150. While performing an assessment on a banking site, you discover the following link: hnps://...
- Q151. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q152. Which of the following tools can be used to perform Windows password cracking, Windows enu...
- Q153. Which of the following Web authentication techniques uses a single sign-on scheme?...
- Q154. Given the following Scapy information, how is default Layer 2 information derived? (Exhibi...
- Q155. Which of the following tools is an example of HIDS?...
- Q156. Which of the following security protocols can be used to support MS-CHAPv2 for wireless cl...
- Q157. Which Metasploit payload includes simple upload and download functionality for moving file...
- Q158. Which of the following Nmap commands is used to perform a UDP port scan?...
- Q159. Analyze the command output below, what action is being performed by the tester? (Exhibit)...
- Q160. Which of the following is a WEP weakness that makes it easy to Inject arbitrary clear text...
- Q161. While performing a code audit, you discover a SQL injection vulnerability assuming the fol...
- Q162. A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester ...
- Q163. Which of the following are the countermeasures against WEP cracking? Each correct answer r...
- Q164. Which of the following tools can be used by a user to hide his identity? Each correct answ...
- Q165. You suspect that a firewall or IPS exists between you and the target machine. Which nmap o...
- Q166. Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized ar...
- Q167. When DNS is being used for load balancing, why would a penetration tester choose to identi...
- Q168. How many bits encryption does SHA-1 use?
- Q169. Where are Netcat's own network activity messages, such as when a connection occurs, sent?...
- Q170. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q171. Which of the following statements are true about session hijacking? Each correct answer re...
- Q172. You have been contracted to perform a black box pen test against the Internet facing serve...
- Q173. You work as a Network Administrator in the Secure Inc. Your company is facing various netw...
- Q174. The employees of CCN Inc. require remote access to the company's proxy servers. In order t...
- Q175. Which of the following statements about SSID is NOT true?...
- Q176. You are conducting a penetration test for a private company located in the UK. The scope e...
- Q177. Which of the following types of Penetration testing provides the testers with complete kno...
- Q178. You have forgotten your password of an online shop. The web application of that online sho...
- Q179. You run the following command on the remote Windows server 2003 computer: c:\reg add HKLM\...
- Q180. You suspect that system administrators In one part of the target organization are turning ...
- Q181. SIMULATION Fill in the blank with the appropriate tool. ____scans IP networks for NetBIOS ...
- Q182. You are done pen testing a Windows system and need to clean up some of the changes you hav...
- Q183. All of the following are advantages of using the Metasploitpriv module for dumping hashes ...
- Q184. Which of the following file transfer programs will automatically convert end-of line chara...
- Q185. Which of the following Web authentication techniques uses a single sign-on scheme?...
- Q186. Which of the following functions can you use to mitigate a command injection attack? Each ...
- Q187. Which of the following tools uses exploits to break into remote operating systems?...
- Q188. Which of the following types of cyber stalking damage the reputation of their victim and t...
- Q189. A penetration tester obtains telnet access to a target machine using a captured credential...
- Q190. Which of the following statements are true about KisMAC?...
- Q191. Which of the following is NOT a valid DNS zone type?...
- Q192. You are pen testing a Windows system remotely via a raw netcat shell. You want to get a li...
- Q193. Adam is a novice Internet user. He is using Google search engine to search documents of hi...
- Q194. Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?...
- Q195. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q196. How does OWASP ZAP function when used for performing web application assessments?...
- Q197. Which of the following techniques is used to monitor telephonic and Internet conversations...
- Q198. You run the following command on the remote Windows server 2003 computer: c:\reg add HKLM\...
- Q199. Network mapping provides a security testing team with a blueprint of the organization. Whi...
- Q200. John works as a professional Ethical Hacker. He is assigned a project to test the security...
- Q201. In which of the following attacks is a malicious packet rejected by an IDS, but accepted b...
- Q202. Which of the following tools is based on the SATAN tool?...
- Q203. Which of the following statements are true about the Enum tool? Each correct answer repres...
- Q204. Which of the following tools are used for footprinting? Each correct answer represents a c...
- Q205. Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymi...
- Q206. You are using the Nmap Scripting Engine and want detailed output of the script as it runs....
- Q207. In which of the following attacks does an attacker use packet sniffing to read network tra...
- Q208. Your company has decided that the risk of performing a penetration test Is too great. You ...
- Q209. Which of the following statements about Fport is true?...
- Q210. Which of the following attacks allows an attacker to recover the key in an RC4 encrypted s...
- Q211. Analyze the screenshot below. What type of vulnerability is being attacked? (Exhibit)...
- Q212. Which of the following wireless security features provides the best wireless security mech...
- Q213. Which of the following techniques is used to monitor telephonic and Internet conversations...
- Q214. You want to search the Apache Web server having version 2.0 using google hacking. Which of...
- Q215. In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entir...
- Q216. Based on the partial appdefstrig rile listed below, which port scan signature is classifie...
- Q217. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q218. You are conducting a penetration test for a private company located in Canada. The scope e...
- Q219. Which of the following penetration testing phases involves gathering data from whois, DNS,...
- Q220. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
- Q221. You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active...
- Q222. 192.168.116.9 Is an IP address forvvww.scanned-server.com. Why are the results from the tw...
- Q223. You have received a file named new.com in your email as an attachment. When you execute th...
- Q224. What is the main difference between LAN MAN and NTLMv1 challenge/responses?...
- Q225. Which of the following is a Windows-based tool that is used for the detection of wireless ...
- Q226. If a password is seven characters or less, the second half of the LM hash is always ______...
- Q227. Fill in the blank with the appropriate act name. The ____act gives consumers the right to ...
- Q228. Which of the following is an open source Web scanner?...
- Q229. You are auditing the security of a client company. You find that their password policy onl...
- Q230. Which of the following tools is not a BlueSnarf attacking tool?...
- Q231. Which of the following statutes is enacted in the U.S., which prohibits creditors from col...
- Q232. Every network device contains a unique built in Media Access Control (MAC) address, which ...
- Q233. What concept do Rainbow Tables use to speed up password cracking?...
- Q234. What is the sequence in which packets are sent when establishing a connection to a secured...
- Q235. In which layer of the OSI model does a sniffer operate?...
- Q236. Which of the following is a tool for SSH and SSL MITM attacks?...
- Q237. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
- Q238. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q239. John works as a Network Security Professional. He is assigned a project to test the securi...
- Q240.
- Q241. You are concerned about war driving bringing hackers attention to your wireless network. W...
- Q242. Adam is a novice Internet user. He is using Google search engine to search documents of hi...
- Q243.
- Q244. Which of the following tools is spyware that makes Windows clients send their passwords as...
- Q245. Which of the following ports is used for NetBIOS null sessions?...
- Q246. Which of the following tools can be used to read NetStumbler's collected data files and pr...
- Q247. Which of the following attacks is a form of active eavesdropping in which the attacker mak...
- Q248. Which of the following can be used to mitigate the evil twin phishing attack?...
- Q249. Which of the following wireless security features provides the best wireless security mech...
- Q250. What is the most likely cause of the responses on lines 10 and 11 of the output below? (Ex...
- Q251. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q252. Which of the following can be used as a countermeasure against the SQL injection attack? E...
- Q253. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
- Q254. During a penetration test we determine that TCP port 22 is listening on a target host. Kno...
- Q255. What will the following scapy commands do? (Exhibit)...
- Q256. Which of the following attacks allows the bypassing of access control lists on servers or ...
- Q257. Which of the following is possible in some SQL injection vulnerabilities on certain types ...
- Q258. Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Pr...
- Q259. What is the purpose of die following command: nc.exe -I -p 2222 -e cmd.exe...
- Q260. In which of the following security tests does the security testing team simulate as an emp...
- Q261. A pen tester is able to pull credential information from memory on a Windows system. Based...
- Q262. Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wir...
- Q263. John works as a professional Ethical Hacker. He is assigned a project to test the security...
- Q264. Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Acti...
- Q265. When a DNS server transfers its zone file to a remote system, what port does it typically ...
- Q266. What is the MOST important document to obtain before beginning any penetration testing?...
- Q267. During a penetration test you discover a valid set of SSH credentials to a remote system. ...
- Q268. Which of the following options holds the strongest password?...
- Q269. Which of the following is a method of gathering user names from a Linux system?...
- Q270. Which of the following Web attacks is performed by manipulating codes of programming langu...
- Q271. Network mapping provides a security testing team with a blueprint of the organization. Whi...
- Q272. Which of the following programming languages are NOT vulnerable to buffer overflow attacks...
- Q273. ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch ...
- Q274. You suspect that system administrators In one part of the target organization are turning ...
- Q275. When DNS is being used for load balancing, why would a penetration tester choose to identi...
- Q276. The employees of CCN Inc. require remote access to the company's proxy servers. In order t...
- Q277. Which of the following tools is used to verify the network structure packets and confirm t...
- Q278. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
- Q279. Which of the following security protocols can be used to support MS-CHAPv2 for wireless cl...
- Q280. In which of the following attacks does the attacker overload the CAM table of the switch?...
- Q281. Which of the following is a passive information gathering tool?...
- Q282. Which of the following can be used as a countermeasure to the rainbow password attack?...
- Q283. Which of the following standards is used in wireless local area networks (WLANs)?...
- Q284. An executive in your company reports odd behavior on her PDA. After investigation you disc...
- Q285. You work as an IT Technician for uCertify Inc. You have to take security measures for the ...
- Q286. In the screen shot below, which selections would you need click in order to intercept and ...
- Q287. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q288. You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly ...
- Q289. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
- Q290. Which of the following tools monitors the radio spectrum for the presence of unauthorized,...
- Q291. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q292. Which of the following is NOT an example of passive footprinting?...
- Q293. Which of the following tools are used for footprinting? Each correct answer represents a c...
- Q294. Which of the following encryption modes are possible in WEP? Each correct answer represent...
- Q295. When sniffing wireless frames, the interface mode plays a key role in successfully collect...
- Q296. Which of the following tools is used for port redirection?...
- Q297. You are pen testing a network and have shell access to a machine via Netcat. You try to us...
- Q298. What difference would you expect to result from running the following commands; (I). S dig...
- Q299. The employees of CCN Inc. require remote access to the company's proxy servers. In order t...
- Q300. Which of the following can be used as a countermeasure against the SQL injection attack? E...
- Q301. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q302. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q303. Which of the following statements are true about the Enum tool? Each correct answer repres...
- Q304. Which of the following tools can be used to automate the MITM attack?...
- Q305. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q306. Which of the following tools can be used to perform Windows password cracking, Windows enu...
- Q307. Which of the following tools is used for the 802.11 HTTP, HTTPS based MITM attacks?...
- Q308. Analyze the screenshot below, which of the following sets of results will be retrieved usi...
- Q309. Which of the following statements are true about SSIDs? Each correct answer represents a c...
- Q310. Which of the following security policies will you implement to keep safe your data when yo...
- Q311. Based on the partial appdefstrig rile listed below, which port scan signature is classifie...
- Q312. A client has asked for a vulnerability scan on an internal network that does not have inte...
- Q313. If the privacy bit is set in the 802.11 header, what does it indicate?...
- Q314. Which of the following tools is used for SNMP enumeration?...
- Q315. GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which ...
- Q316. Which of the following ports must you filter to check null sessions on your network?...
- Q317. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
- Q318. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q319. Which of the following tools can be used as a Linux vulnerability scanner that is capable ...
- Q320. Which of the following tasks is NOT performed into the enumeration phase?...
- Q321. What is the most likely cause of the responses on lines 10 and 11 of the output below? (Ex...
- Q322. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q323. Which of the following tools is used for SNMP enumeration?...
- Q324. Which of the following tasks is NOT performed by antiviruses?...
- Q325. What is the maximum limit of the file size that a user can upload according to the code sn...
- Q326. You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to invest...
- Q327. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q328. You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active...
- Q329. Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymi...
- Q330. By default Active Directory Controllers store password representations in which file?...
- Q331. You want to obtain the Information of a Web server, whose IP address range comes in the IP...
- Q332. You want to retrieve the default security report of nessus. Which of the following google ...
- Q333. Which type of Cross-Sire Scripting (XSS> vulnerability is hardest for automated testing...
- Q334. You have obtained the hash below from the /etc/shadow file. What are you able to discern s...
- Q335. You run the following bash script in Linux: for i in 'cat hostlist.txt' ;do nc -q 2 -v $i ...
- Q336. Which of the following best describes a client side exploit?...
- Q337. Which of the following protocols uses a combination of public key and symmetric encryption...
- Q338. Fill in the blank with the appropriate tool. ____scans IP networks for NetBIOS name inform...
- Q339. Analyze the output of the two commands below: (Exhibit) Which of the following can be fact...
- Q340. You have compromised a Windows workstation using Metasploit and have injected the Meterpre...
- Q341. Which of the following can be the countermeasures to prevent NetBIOS NULL session enumerat...
- Q342. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
- Q343. Which of the following tasks is NOT performed by antiviruses?...
- Q344. Fill in the blank with the appropriate word. ____is a port scanner that can also be used f...
- Q345. Which of the following tasks can be performed by using netcat utility? Each correct answer...
- Q346. You have compromised a Windows XP system and Injected the Meterpreter payload into the lsa...
- Q347. Which of the following can be used to perform session hijacking? Each correct answer repre...
- Q348. Which of the following tools crashes computers running Windows 2000/XP/NT by sending craft...
- Q349. Which of the following Nmap commands is used to perform a UDP port scan?...
- Q350. Which of the following can be used as a countermeasure against the SQL injection attack? E...
- Q351. Analyze the screenshot below, which of the following sets of results will be retrieved usi...
- Q352. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
- Q353. One of the sales people in your company complains that sometimes he gets a lot of unsolici...
- Q354. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q355. How can web server logs be leveraged to perform Cross-Site Scripting (XSSI?...
- Q356. A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulne...
- Q357. You have detected what appears to be an unauthorized wireless access point on your network...
- Q358. You work as an Administrator for Bluesky Inc. The company has 145 Windows XP Professional ...
- Q359. Which of the following is the second half of the LAN manager Hash?...
- Q360. Which of the following password cracking tools can work on the Unix and Linux environment?...
- Q361. You want to retrieve the default security report of nessus. Which of the following google ...
- Q362. John works as an Ethical Hacker for uCertify Inc. He wants to find out the ports that are ...
- Q363. In which of the following attacks is a malicious packet rejected by an IDS, but accepted b...
