What is the best defense a security engineer performs when he finds some vulnerability in a system caused by the weakness of the installed application?
Correct
Incorrect
Question 2 of 100
2. Question
1 point(s)
An attacker completely changes the appearance of a website by replacing the original data and writing their own messages. What type of attack did he perform?
Correct
Incorrect
Question 3 of 100
3. Question
1 point(s)
How do security engineers defend their applications from XSS Attacks?
Correct
Incorrect
Question 4 of 100
4. Question
1 point(s)
Which of the following method is used to prevent SQL injection attacks?
Correct
Incorrect
Question 5 of 100
5. Question
1 point(s)
The type of SQL injection attack in which the attacker has no error message from the system with which to work and the attacker sends a malicious SQL query to the database is called______.
Correct
Incorrect
Question 6 of 100
6. Question
1 point(s)
The attacker performs a query like the below: SELECT* FROM users WHERE name =’’ OR ‘1’ = ’1 ; Which of the following type of SQL injection based on the query?
Correct
Incorrect
Question 7 of 100
7. Question
1 point(s)
A network engineer configured a new access point using WPA2 from a security perspective. What is the best way to prevent an attacker from performing WPA2 cracking at the access point?
Correct
Incorrect
Question 8 of 100
8. Question
1 point(s)
What is a technique to detect rogue AP using access point ability to detect neighboring APs operating in the nearby area?
Correct
Incorrect
Question 9 of 100
9. Question
1 point(s)
Which of the following is a mobile hacking countermeasure?
Correct
Incorrect
Question 10 of 100
10. Question
1 point(s)
To ensure the correct defensive implementation for the cloud security architecture in a cloud environment, what category of security control is used to minimize an accident’s consequences, probably by limiting the damage?
Correct
Incorrect
Question 11 of 100
11. Question
1 point(s)
What is the best description of Mobile Device Management (MDM)?
Correct
Incorrect
Question 12 of 100
12. Question
1 point(s)
Which of the following are NOT basic features of Mobile Device Management (MDM)?
Correct
Incorrect
Question 13 of 100
13. Question
1 point(s)
Which of the following tool is used for Session Splicing?
Correct
Incorrect
Question 14 of 100
14. Question
1 point(s)
Which of the following tool is used for Evasion IDS/Firewall?
Correct
Incorrect
Question 15 of 100
15. Question
1 point(s)
Which tool does an attacker use to capture and read real-time data on a wireless network?
Correct
Incorrect
Question 16 of 100
16. Question
1 point(s)
A tool consists of a detector, packet sniffer, WEP, and WAP/WAP2 – PSK cracker and analysis tool for 802.11 wireless networks. Which tool does an attacker use for cracking a password?
Correct
Incorrect
Question 17 of 100
17. Question
1 point(s)
Which of the following Nmap options is used to perform the Stealth Scan technique?
Correct
Incorrect
Question 18 of 100
18. Question
1 point(s)
A penetration tester scans the target system using Nmap and gets a result like the picture below. Which option did he use for scanning?
Correct
Incorrect
Question 19 of 100
19. Question
1 point(s)
Which of the following tool would a penetration tester use to perform a vulnerability assessment on the system?
Correct
Incorrect
Question 20 of 100
20. Question
1 point(s)
Which of the following tool is used to perform website mirroring?
Correct
Incorrect
Question 21 of 100
21. Question
1 point(s)
Hyena is a tool for managing and securing the windows operating system and uses a windows explorer-style interface for all operations. It shows shares and user login names for windows servers and domain controllers. What is the purpose of using this tool?
Correct
Incorrect
Question 22 of 100
22. Question
1 point(s)
What tool would a network administrator use to perform SNMP enumeration on their network?
Correct
Incorrect
Question 23 of 100
23. Question
1 point(s)
Which of the following DoS tool is a High-speed multi-threaded HTTP Flood and is designed to perform attacks on up to 256 target URLs at the same time?
Correct
Incorrect
Question 24 of 100
24. Question
1 point(s)
The system administrator wants to ensure appropriate patches are installed on the system to fix bugs and vulnerabilities. He needs to detect missing security patches and choose what patches need to install on the system. Which of the following tool can be used to help a system administrator?
Correct
Incorrect
Question 25 of 100
25. Question
1 point(s)
Which tool does an attacker use to gain access to the web server with the exploitation of a known vulnerability?
Correct
Incorrect
Question 26 of 100
26. Question
1 point(s)
A company performs penetration testing for small and medium-size businesses in the local area. The main objective of testing is to assess all vulnerabilities in web applications used by the company. Which of the following tools to find the vulnerability?
Correct
Incorrect
Question 27 of 100
27. Question
1 point(s)
Which tool does a network administrator use to detect SQL Injection Attacks by using the below-mentioned configuration?
Correct
Incorrect
Question 28 of 100
28. Question
1 point(s)
Which of the following Android app allows you to sniff and intercept web session profiles over Wi-Fi?
Correct
Incorrect
Question 29 of 100
29. Question
1 point(s)
A penetration tester is conducting a port scan on a specific host and finds several ports opened. Based on the Nmap results below, which of the following system used on the target machine?
Correct
Incorrect
Question 30 of 100
30. Question
1 point(s)
The company asks you to perform penetration testing to improve security on its network. Therefore, they did not provide any information besides the company name. What should be the first step in security testing the client?
Correct
Incorrect
Question 31 of 100
31. Question
1 point(s)
A web server got attacked using obstructed URL. How would you prevent these attacks?
Correct
Incorrect
Question 32 of 100
32. Question
1 point(s)
The penetration tester attempts to insert the following test script into the search area on the company’s website, < script>alert(“this is Penetration Testing”) After that, a pop-up box appears on the screen when the tester presses the search button. Which type of vulnerability has been detected in the web application?
Correct
Incorrect
Question 33 of 100
33. Question
1 point(s)
OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS V1) network protocols and related cryptography standards required by them. Choose the correct command to connect to a secure server.
Correct
Incorrect
Question 34 of 100
34. Question
1 point(s)
The OWASP Top 10 is a standard awareness document for developers and web application security. Which of the following is the most critical security risk based on the OWASP top 10?
Correct
Incorrect
Question 35 of 100
35. Question
1 point(s)
An employee reported to the IT staff that someone had unauthorized access to their computer. The IT staff takes action to disconnect the computer and power it down. What step in incident handling is performed here?
Correct
Incorrect
Question 36 of 100
36. Question
1 point(s)
Hashing means generating a value or values from a text using a mathematical function. Which of the following is assured by the use of hash?
Correct
Incorrect
Question 37 of 100
37. Question
1 point(s)
Which of the following tool a network administrator use to monitor TCP/UDP ports that are in a listening state or another state?
Correct
Incorrect
Question 38 of 100
38. Question
1 point(s)
A network security engineer wants to perform daily scans to monitor the internal network and look for unauthorized devices. He writes a script that will use to scan the network every day. Which of the following programming language would most likely be used?
Correct
Incorrect
Question 39 of 100
39. Question
1 point(s)
Which of the following programming language gets vulnerable to buffer overflow attacks?
Correct
Incorrect
Question 40 of 100
40. Question
1 point(s)
Which of the following is the correct command to perform an XMAS Scan using Nmap?
Correct
Incorrect
Question 41 of 100
41. Question
1 point(s)
What is the purpose of removing unnecessary ISAPI filters?
Correct
Incorrect
Question 42 of 100
42. Question
1 point(s)
Which of the following stage in Web Server attack methodology has the purpose of knowing about the Web Server’s remote access capabilities, port and services, and other aspects of its security?
Correct
Incorrect
Question 43 of 100
43. Question
1 point(s)
OS Fingerprinting is the process of gathering information about the operating system the target machine uses. Which of the following tool that used for passive OS fingerprinting?
Correct
Incorrect
Question 44 of 100
44. Question
1 point(s)
Which of the following is NOT included in wireless Hacking Methodology?
Correct
Incorrect
Question 45 of 100
45. Question
1 point(s)
What is the purpose of Wireless Access Control?
Correct
Incorrect
Question 46 of 100
46. Question
1 point(s)
Which of the following is an example of Two-factor authentication?
Correct
Incorrect
Question 47 of 100
47. Question
1 point(s)
Security analyst wants to capture website traffic in Wireshark. He wants to display all TCP packets using port 80. What should a display filter be used by The Security Analyst?
Correct
Incorrect
Question 48 of 100
48. Question
1 point(s)
Which of the following incident handling process phases is to ensure employees are appropriately trained regarding the possibility of a data breach, develop incident response scenarios, and evaluate incident response plans?
Correct
Incorrect
Question 49 of 100
49. Question
1 point(s)
IP address spoofing is a hijacking technique in which an attacker obtains a computer’s IP address, alters the packet headers, and sends request packets to a target machine, pretending to be a legitimate host. Which IP spoofing detection technique succeeds when the attacker is in the same subnet?
Correct
Incorrect
Question 50 of 100
50. Question
1 point(s)
Based on the OSI Reference Model, which layer performs TCP/IP Session Hijacking?
Correct
Incorrect
Question 51 of 100
51. Question
1 point(s)
What steps should a security analyst take after discovering some vulnerability on a company’s website?
Correct
Incorrect
Question 52 of 100
52. Question
1 point(s)
The syntax below is used for creating a database account on DBMS. Which of the following DBMS type based on the exhibit?
Correct
Incorrect
Question 53 of 100
53. Question
1 point(s)
The NIST has developed the secure Hash Algorithm (SHA), specified the Secure Hash Standard (SHS), and published it as a federal information processing standard (FIPS PUB 180). What is the block size used by SHA2-512?
Correct
Incorrect
Question 54 of 100
54. Question
1 point(s)
Which of the following advanced google search operators allows an attacker to show lists of web pages that are similar to a specified web page?
Correct
Incorrect
Question 55 of 100
55. Question
1 point(s)
A penetration tester wants to scan a company’s network. The network address is 192.168.1.64 with mask 255.255.255.192 with IP address servers 192.168.1.123 and 192.168.1.124. The tester scans the network using Nmap with the command: “nmap 192.168.1.64/29,” but not shown server in the scanning process. What should he do?
Correct
Incorrect
Question 56 of 100
56. Question
1 point(s)
Which of the following type of viruses usually infects the files created by Microsoft products?
Correct
Incorrect
Question 57 of 100
57. Question
1 point(s)
The attackers attempt to perform session hijacking. Which of the following method of session hijacking that attackers perform based on the picture below?
Correct
Incorrect
Question 58 of 100
58. Question
1 point(s)
Domain Name System (DNS) has a few types of records. One type of them is AAAA Record. What is the purpose of the AAAA Record?
Correct
Incorrect
Question 59 of 100
59. Question
1 point(s)
The system administrator wants to check a Linux machine’s file containing users’ passwords. Which of the following is a file that stores users’ passwords in Linux?
Correct
Incorrect
Question 60 of 100
60. Question
1 point(s)
Which of the following is a file in the Linux directory that is used to store information such as logs, spool files, and temporary email files?
Correct
Incorrect
Question 61 of 100
61. Question
1 point(s)
The system administrator set this configuration in the system: What kind of system is the system administrator working with?
Correct
Incorrect
Question 62 of 100
62. Question
1 point(s)
The system administrator considers analyzing server logs in Linux machines. Which of the following is the best command line tool that can be used to open log files via the terminal?
Correct
Incorrect
Question 63 of 100
63. Question
1 point(s)
Based on the NITS cloud computing reference architecture, there are five significant actors in the cloud deployment. What actors independently examine cloud service controls to express an opinion thereon?
Correct
Incorrect
Question 64 of 100
64. Question
1 point(s)
Which of the following is a countermeasure against SMTP Enumeration?
Correct
Incorrect
Question 65 of 100
65. Question
1 point(s)
Which of the following type of cloud computing offers application software to subscribers on-demand over the Internet, and the provider charges for it on a pay-per-use basis?
Correct
Incorrect
Question 66 of 100
66. Question
1 point(s)
Your company plans to migrate from on-premises to a public cloud service. What are the advantages of using a public cloud? (Choose two)
Correct
Incorrect
Question 67 of 100
67. Question
1 point(s)
The NIST cloud computing reference architecture describes the primary actors, their activities, and functions in cloud computing. Which of the following best description of Cloud Carrier?
Correct
Incorrect
Question 68 of 100
68. Question
1 point(s)
Your company implements information security control in the cloud. They use a strong authentication mechanism to prevent unauthorized access to the cloud system. Which of the following security control categories are performed by the company?
Correct
Incorrect
Question 69 of 100
69. Question
1 point(s)
Footprinting is the first step of an attack on information systems in which an attacker collect information about the target network to identify the various way to attack the system. Which of the following are the active footprinting techniques? (Choose two)
Correct
Incorrect
Question 70 of 100
70. Question
1 point(s)
An attacker wants to obtain information about who owned the specific domain, DNS, and other information related to that domain. Which of the following tool can be used by the attacker?
Correct
Incorrect
Question 71 of 100
71. Question
1 point(s)
Which of the following google hacking technique used to find the files with a specific file extension?
Correct
Incorrect
Question 72 of 100
72. Question
1 point(s)
An attacker secretly stands behind the victim and observers the employee’s activity on the computer to gain some credential information such as a username and password. Which of the following type of attacks the attacker performed?
Correct
Incorrect
Question 73 of 100
73. Question
1 point(s)
Bob uses the Hping tool as a security analyst to scan the company network. He wants to perform UDP Scan for a specific target. Which command should be used?
Correct
Incorrect
Question 74 of 100
74. Question
1 point(s)
Refer to the exhibit. Which of the following Nmap options that used?
Correct
Incorrect
Question 75 of 100
75. Question
1 point(s)
Which of the following Nmap options performs the TCP Connect Scan technique?
Correct
Incorrect
Question 76 of 100
76. Question
1 point(s)
Finding the target operating system is important for an attacker to compromise and target the network/machine. Parameters like Time to Live (TTL) and TCP window size in the IP header can be analyzed to get information about the operating system. Which of the following are the correct values of TTL and TCP Window size in the Windows machine? (Choose two)
Correct
Incorrect
Question 77 of 100
77. Question
1 point(s)
As a penetration tester, you scan ports on the public server and find some ports open. One of the ports is UDP 137. What type of services are run on this server?
Correct
Incorrect
Question 78 of 100
78. Question
1 point(s)
Which of the following tools are used for NetBIOS enumeration? (Choose two)
Correct
Incorrect
Question 79 of 100
79. Question
1 point(s)
A Network administrator wants to perform LDAP enumeration on their network. Which of these tools would provide this action?
Correct
Incorrect
Question 80 of 100
80. Question
1 point(s)
Which of the following countermeasures against LDAP Enumeration?
Correct
Incorrect
Question 81 of 100
81. Question
1 point(s)
The vulnerability management life cycle is an important process that helps find and remediate security weaknesses before they are exploited. Which of the following step involved in creating baseline phases? (Choose two)
Correct
Incorrect
Question 82 of 100
82. Question
1 point(s)
CVSS is a published standard that provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. Three metrics are used in CVSS assessments to gauge vulnerabilities. The best Explanation of base metric is which of the following?
Correct
Incorrect
Question 83 of 100
83. Question
1 point(s)
Which of the following tools is used for vulnerability analysis? (Choose two)
Correct
Incorrect
Question 84 of 100
84. Question
1 point(s)
An attacker performs a password attack on the target using the brute-forcing technique. What type of password attack that performed?
Correct
Incorrect
Question 85 of 100
85. Question
1 point(s)
A keylogger is a hardware or software program that secretly records each keystroke on the user’s keyboard. What are the types of hardware keystroke loggers? (Choose two)
Correct
Incorrect
Question 86 of 100
86. Question
1 point(s)
Which of the following type of viruses are programmed in such a way that they rewrite themselves completely each time they infect a new executable file?
Correct
Incorrect
Question 87 of 100
87. Question
1 point(s)
Standalone malicious programs that replicate, execute, and spread across network connections independently, without human intervention. Causing servers and individual computer systems to become overloaded and stop responding. Which of the following malware matches the description?
Correct
Incorrect
Question 88 of 100
88. Question
1 point(s)
Which of the following are static malware analysis techniques? (Choose two)
Correct
Incorrect
Question 89 of 100
89. Question
1 point(s)
In the penetration testing process, a tester does not know the network or application running on the company. What type of penetration testing is performed?
Correct
Incorrect
Question 90 of 100
90. Question
1 point(s)
Which of the following standards is associated with the payment card industry?
Correct
Incorrect
Question 91 of 100
91. Question
1 point(s)
Company XYZ uses a permissive policy to protect its own business. What is the best description of this policy?
Correct
Incorrect
Question 92 of 100
92. Question
1 point(s)
The employee cannot access essential data on the company server. The failure of the company network caused it. What is the information security problem the company faces?
Correct
Incorrect
Question 93 of 100
93. Question
1 point(s)
Which of the following controls ensures data integrity? (Choose two)
Correct
Incorrect
Question 94 of 100
94. Question
1 point(s)
Which type of hacker attacks the system using tools and knowledge found on the internet?
Correct
Incorrect
Question 95 of 100
95. Question
1 point(s)
Social engineers exploit human behavior (manners, enthusiasm toward work, laziness, innocence, etc.) to gain access to the targeted company’s information resources. Which of the following defense strategy against social engineering attacks such as dumpster diving? (Choose two)
Correct
Incorrect
Question 96 of 100
96. Question
1 point(s)
An attacker launches a phishing attack with the target being a high-profile executive with valuable information. Which type of phishing attack is being discussed?
Correct
Incorrect
Question 97 of 100
97. Question
1 point(s)
An attacker launches a DoS attack by spoofing the source IP address with the victim’s IP address and sends many ICMP ECHO request packets to an IP broadcast network. It causes all the hosts on the broadcast network to respond to the received ICMP ECHO requests. Which type of DoS attack was performed?
Correct
Incorrect
Question 98 of 100
98. Question
1 point(s)
Which tools are used to launch a denial of service attack? (Choose two)
Correct
Incorrect
Question 99 of 100
99. Question
1 point(s)
The DoS detection technique uses the Cumulative Sum (Cusum) algorithm to identify and locate the DoS attacks. The algorithm calculates actual versus expected local average deviations in the traffic time series. Which of the following DoS detection techniques is being discussed?
Correct
Incorrect
Question 100 of 100
100. Question
1 point(s)
Which of the following is the best description of session hijacking?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.