SSIDs serve many functions, but the primary goal is which of the...
Which of the following techniques could be used to test the strength...
Which Linux folder holds the password and shadow files?
Snort can be used in which of the following modes?
In wireshark, the packet bytes pane shows the data of the current...
Which device is typically used with software such as Wireshark to aid...
Bob has gone to an electronic retail store website to gather...
In the context of the Microsoft Windows NT, which Security Identifier...
What capability does a backdoor provide to the adversary?
A background program that resides on a computer and services requests...
Mike is performing an activity of guessing every possible password...
Entering Password: blah' or 1=1- into a web form is an example of what...
Which command-line tool displays a list of active connections a...
Which of the following is a true statement regarding SSIDs?
What are the port states determined by Nmap?
Which statement is the MOST accurate regarding firewalls?
Which of the following is an asymmetric encryption algorithm?
NSLookup is a good tool to use to gain additional information about a...
Which of the following ports is used by the Network Time Protocol...
In this protection mechanism used by some operating systems, memory...
Which of the following are functions of Arpwatch?
Which of the following types of penetration testing requires partial...
A big concern in distributed environments is the _____________, in...
What does this command do in nmap -T4 -A -p 1-1000 -oX -...
What command is used to launch the computer management console in...
There are some programs that can be used to provide unexpected or...
An employee receives an email with the following body. Is this a...
Which of the following is a utility that allows you to query the DNS...
(Inherent risk) - (impact of risk controls) = ?
In the IPv6 header, the traffic class field is similar to which field...
Alyssa is performing a penetration test on an enterprise network. Upon...
Sending a probe to the target system using a ping scan is a form of...
An application that is designed to look like a known legitimate...
What is the length of the IPv6 datagram header?
An attacker runs netcat tool to transfer a secret file between two...
You identify a WAP network that...
You have selected the option in your IDS to notify you via email if it...
Bob is an IT auditor of a bank. He finds a new rule has been...
Which of the following switches enables an idle scan within the Nmap...
An example of a tshark command using fetch filtering to capture...
Which footprinting tool or technique can be used to find information...
Vulnerability mapping occurs after which phase of a penetration...
How many keys are used in symmetric key encryption?
Which of the following is an extended version of Nikto designed for...
You're using nmap to run port scans. Which of the following commands...
Windows machines use __________ for bridged networking for hardware...
Your lab partner is trying to find out more information about a...
MAC spoofing applies a legitimate MAC address to an unauthenticated...
Bluejacking is an attack that does which of the following to a...
What is the first step in a form based SQL injection attack?
Bob has a network that is a branch of his central office. The central...
To protect against collision attacks and the use of rainbow tables,...
When discussing password attacks, what is considered a rubber hose...
The nmap TCP Window scan is performed by which of the following...
Which of the following actions is considered unethical in a...
What is wrong with the following configuration?
A penetration test is underway in Natasha's office as per directive...
Which of the following has been created with a Trojan for the purpose...
During an out-brief from a pen test, you hear reference to an ACK...
In DNS, we can have multiple answers and we call them Resource...
Why are many programs vulnerable to SQL injection and buffer overflow...
Which of the following is a correct MAC address?
Which of following methods uses traceroute-like IP packet analysis to...
How can you determine if an LM hash you extracted contains a password...
Which of the following terms describes a firewall with multiple...
You are attempting to identify active machines on a subnet. What is...
IPSec uses which two modes?
By default, when you browse an HTTPS website via Burp, the Proxy...
How can IP address spoofing be detected?
From the information given in the Wireshark pcap file, what operating...
How will the target respond to an XMAS scan of a closed port?
Host 1 is trying to communicate with Host 2. The e0 interface on...
Encryption is not universally supported by all email providers. When...
Which Nmap scan initiates but does not complete a TCP...
Which auxiliary in Metasploit allows you to scan for SNMP...
Mike is a black hat hacker and forges an identification badge and...
ARP poisoning alters ARP table mappings to align all traffic to the...
You are reviewing a packet capture in Wireshark but only need to see...
Which of the following is a denial-of-service attack against a...
Public-key cryptography allows for secure communications, strong...
Which of the following is the most important step for an ethical...
Which of the following commands could a hacker enter in a web form...
A new member of the pen test team has discovered a WAP that is using...
Which of the following features are present in IPv4 header but not in...
If an attacker spoofs host A's IP...
Because of its obvious rule-breaking nature, what scan method flagged...
Ali and Mike are both ethical hackers and have gained access to a...
How would you describe an attacker's attempts to deliver the payload...
An IPID parameter is used in which of the following scans?
When an IDS fails to detect a malicious activity, this is referred to...
Which of the following is used to distribute a public key within the...
Which of the following provides anonymity when surfing the Web?...
Which of the following scans allows for "blind scanning" by using a...
Which of the following are private IP addresses that can be assigned...
Which Google hack would display all pages that have the phrase "SQL"...
Which statement describes how public/private key pair is used to...
Within a PKI system, Ali encrypts a message for Mike and sends it....
Which of the following tools is used by hackers to perform slow-rate...
Which of the following will allow footprinting to be conducted without...
Which of the following are valid types of IPv6 address? [Select all...
Two-factor authentication can refer to the following statements....
Bob is having no luck performing a penetration test on Retail...
The port numbers range from 0 to 65,535 and are split into three...
Which of the following statements is true regarding symmetric...
Take for example a shop's web portal, which displays items that are...
A hierarchical data model uses a tree structure and a parent/child...
What are the ways in which an IDS is able to detect intrusion...
Which of the following is true about cloud based malware detection?
Data is encrypted or authenticated at which of the following layers,...
By viewing encryption process figures, can you identify the encryption...
Which type of attack is used to redirect users to an incorrect DNS...
"Message repudiation" refers to what concept in the realm of email...
A system is compromised and is able to spawn a connection back to the...
You want to ensure your messages are safe from unauthorized...
Penetration testers hide Metasploit shellcode to evade Windows...
Which of the following types of sensors has a quicker response than...
Health-case entities must ensure that which of the following is in...
What authentication factor is based on the location of the user?
Which of the following is defined as an analysis of an IT system's...
Which of the following is part of a public key infrastructure (PKI), a...
OpenSSL comes with a client tool that you can use to connect to a...
A company's CEO wants the perimeter of the building monitored 24/7...
Which of the following is a honeypot detection tool?
In HTML injection attack, attacker crafts a malicious link, including...
What is the proper command to perform an Nmap XMAS scan every 15...
A user wants to surf a web page on a server. The first segment leaving...
Which of the following is a correct standard access list to allow...
Which of the following best describes a vulnerability?
An attacker has successfully connected a laptop to a switch port and...
What is the the fundamental use case for DHCP snooping? [Select...
Modern Linux systems log all authentication attempts in a discrete...
Which of the following attacks will be performed by running hping3 -c...
What type of attack is the adversary conducting in the following...
During the Evidence Gathering and Collection phases of incident...
Kerberos is an authentication, accounting, and authorization (AAA)...
In cryptography, why are MD5 and SHA1 called broken algorithms?...
What should every IT administrator know about downtime of an alternate...
What type of rootkits will patch, hook, or replace the version of...
Which of the following tactics is used in social engineering attacks?...
Which statement most accurately describes PCI DSS compliance? [Select...
When an event has been reported by employees or detected by automated...
From a security perspective, containers are the Wild West – full...
What are inevitable consequences of the non-flexible nature of static...
If session hijacking is a concern on a network, the administrator can...
What is the common reason for using split DNS systems?
Which of the following are potential attacks on cryptography? [Select...
In PCI-DSS what is the goal of implementing strong access control...