SSIDs serve many functions, but the primary goal is which of the...
Which of the following techniques could be used to test the strength...
Which Linux folder holds the password and shadow files?
In the context of the Microsoft Windows NT, which Security Identifier...
What capability does a backdoor provide to the adversary?
Entering Password: blah' or 1=1- into a web form is an example of what...
Which command-line tool displays a list of active connections a...
Which of the following is a true statement regarding SSIDs?
Snort can be used in which of the following modes?
In wireshark, the packet bytes pane shows the data of the current...
Which device is typically used with software such as Wireshark to aid...
Bob has gone to an electronic retail store website to gather...
A background program that resides on a computer and services requests...
Which of the following is an asymmetric encryption algorithm?
In this protection mechanism used by some operating systems, memory...
Mike is performing an activity of guessing every possible password...
Which of the following are functions of Arpwatch?
Which of the following types of penetration testing requires partial...
A big concern in distributed environments is the _____________, in...
What are the port states determined by Nmap?
What command is used to launch the computer management console in...
Which statement is the MOST accurate regarding firewalls?
An employee receives an email with the following body. Is this a...
Which of the following ports is used by the Network Time Protocol...
Sending a probe to the target system using a ping scan is a form of...
What does this command do in nmap -T4 -A -p 1-1000 -oX -...
An application that is designed to look like a known legitimate...
There are some programs that can be used to provide unexpected or...
What is the length of the IPv6 datagram header?
An attacker runs netcat tool to transfer a secret file between two...
NSLookup is a good tool to use to gain additional information about a...
How many keys are used in symmetric key encryption?
Alyssa is performing a penetration test on an enterprise network. Upon...
(Inherent risk) - (impact of risk controls) = ?
Which of the following is an extended version of Nikto designed for...
Windows machines use __________ for bridged networking for hardware...
In the IPv6 header, the traffic class field is similar to which field...
Which of the following switches enables an idle scan within the Nmap...
An example of a tshark command using fetch filtering to capture...
You identify a WAP network that...
The nmap TCP Window scan is performed by which of the following...
Vulnerability mapping occurs after which phase of a penetration...
You have selected the option in your IDS to notify you via email if it...
Bob is an IT auditor of a bank. He finds a new rule has been...
Which footprinting tool or technique can be used to find information...
What is wrong with the following configuration?
A penetration test is underway in Natasha's office as per directive...
You're using nmap to run port scans. Which of the following commands...
Which of the following has been created with a Trojan for the purpose...
Bluejacking is an attack that does which of the following to a...
Which of the following is a utility that allows you to query the DNS...
Why are many programs vulnerable to SQL injection and buffer overflow...
Which of following methods uses traceroute-like IP packet analysis to...
Bob has a network that is a branch of his central office. The central...
Your lab partner is trying to find out more information about a...
MAC spoofing applies a legitimate MAC address to an unauthenticated...
What is the first step in a form based SQL injection attack?
To protect against collision attacks and the use of rainbow tables,...
When discussing password attacks, what is considered a rubber hose...
By default, when you browse an HTTPS website via Burp, the Proxy...
In DNS, we can have multiple answers and we call them Resource...
Which of the following is a correct MAC address?
How can you determine if an LM hash you extracted contains a password...
Which of the following actions is considered unethical in a...
Which of the following terms describes a firewall with multiple...
Which of the following is a denial-of-service attack against a...
During an out-brief from a pen test, you hear reference to an ACK...
You are attempting to identify active machines on a subnet. What is...
IPSec uses which two modes?
Which of the following is the most important step for an ethical...
How can IP address spoofing be detected?
From the information given in the Wireshark pcap file, what operating...
How will the target respond to an XMAS scan of a closed port?
Which of the following features are present in IPv4 header but not in...
Host 1 is trying to communicate with Host 2. The e0 interface on...
Encryption is not universally supported by all email providers. When...
Which Nmap scan initiates but does not complete a TCP...
Mike is a black hat hacker and forges an identification badge and...
ARP poisoning alters ARP table mappings to align all traffic to the...
You are reviewing a packet capture in Wireshark but only need to see...
Public-key cryptography allows for secure communications, strong...
An IPID parameter is used in which of the following scans?
Which of the following commands could a hacker enter in a web form...
A new member of the pen test team has discovered a WAP that is using...
Which auxiliary in Metasploit allows you to scan for SNMP...
Which of the following is used to distribute a public key within the...
If an attacker spoofs host A's IP...
Because of its obvious rule-breaking nature, what scan method flagged...
Ali and Mike are both ethical hackers and have gained access to a...
When an IDS fails to detect a malicious activity, this is referred to...
Bob is having no luck performing a penetration test on Retail...
Which of the following provides anonymity when surfing the Web?...
Which of the following tools is used by hackers to perform slow-rate...
How would you describe an attacker's attempts to deliver the payload...
Which of the following are private IP addresses that can be assigned...
Which Google hack would display all pages that have the phrase "SQL"...
Which of the following are valid types of IPv6 address? [Select all...
Within a PKI system, Ali encrypts a message for Mike and sends it....
Which of the following scans allows for "blind scanning" by using a...
The port numbers range from 0 to 65,535 and are split into three...
Which of the following statements is true regarding symmetric...
Which of the following will allow footprinting to be conducted without...
A system is compromised and is able to spawn a connection back to the...
Which statement describes how public/private key pair is used to...
Two-factor authentication can refer to the following statements....
Take for example a shop's web portal, which displays items that are...
A hierarchical data model uses a tree structure and a parent/child...
Which of the following is defined as an analysis of an IT system's...
Which of the following is true about cloud based malware detection?
What are the ways in which an IDS is able to detect intrusion...
Data is encrypted or authenticated at which of the following layers,...
Which type of attack is used to redirect users to an incorrect DNS...
You want to ensure your messages are safe from unauthorized...
OpenSSL comes with a client tool that you can use to connect to a...
Penetration testers hide Metasploit shellcode to evade Windows...
"Message repudiation" refers to what concept in the realm of email...
Which of the following is part of a public key infrastructure (PKI), a...
Which of the following types of sensors has a quicker response than...
Health-case entities must ensure that which of the following is in...
What authentication factor is based on the location of the user?
What is the proper command to perform an Nmap XMAS scan every 15...
By viewing encryption process figures, can you identify the encryption...
A company's CEO wants the perimeter of the building monitored 24/7...
Which of the following is a honeypot detection tool?
In HTML injection attack, attacker crafts a malicious link, including...
What type of attack is the adversary conducting in the following...
A user wants to surf a web page on a server. The first segment leaving...
Which of the following is a correct standard access list to allow...
What is the the fundamental use case for DHCP snooping? [Select...
Which of the following best describes a vulnerability?
An attacker has successfully connected a laptop to a switch port and...
Kerberos is an authentication, accounting, and authorization (AAA)...
Modern Linux systems log all authentication attempts in a discrete...
Which of the following attacks will be performed by running hping3 -c...
During the Evidence Gathering and Collection phases of incident...
In cryptography, why are MD5 and SHA1 called broken algorithms?...
Which of the following tactics is used in social engineering attacks?...
What should every IT administrator know about downtime of an alternate...
What type of rootkits will patch, hook, or replace the version of...
From a security perspective, containers are the Wild West – full...
When an event has been reported by employees or detected by automated...
Which statement most accurately describes PCI DSS compliance? [Select...
What are inevitable consequences of the non-flexible nature of static...
If session hijacking is a concern on a network, the administrator can...
What is the common reason for using split DNS systems?
Which of the following are potential attacks on cryptography? [Select...
In PCI-DSS what is the goal of implementing strong access control...