Which system consists of a set of databases that are open to the public and contain domain name registration contact information?
Correct
Incorrect
Question 2 of 100
2. Question
1 point(s)
For a test, a pen tester configures a Windows laptop. What river and library are necessary when setting up Wireshark to allow the NIC to work in promiscuous mode?
Correct
Incorrect
Question 3 of 100
3. Question
1 point(s)
When you scan your company’s network, you see that TCP port 123 is open. What services use TCP port 123 by default?
Correct
Incorrect
Question 4 of 100
4. Question
1 point(s)
What does option (*) mean?
Correct
Incorrect
Question 5 of 100
5. Question
1 point(s)
Which of the following is a command-line packet analyzer similar to Wireshark’s graphical user interface?
Correct
Incorrect
Question 6 of 100
6. Question
1 point(s)
Anthony, a network administrator at BigUniversity, noticed that some students are using the wired network to link their notebooks to the Internet. Professors and approved visitors have access to several Ethernet ports on the university campus, but students do not.
When the IDS alerted him to malware activity in the network, he realized what was going on. What should Anthony do in order to avert this issue?
Correct
Incorrect
Question 7 of 100
7. Question
1 point(s)
You get a frantic call from the organization’s security team while executing ping scans into a target network.
They say a denial of service attack is attacking them. The smurf attack incident disappears when you cease scanning from the organization’s IDS monitor.
How can you change your scan to avoid generating this IDS event?
Correct
Incorrect
Question 8 of 100
8. Question
1 point(s)
You used the TCP XMAS scan as part of a technical evaluation to identify network vulnerabilities. What would all open ports’ reactions be?
Correct
Incorrect
Question 9 of 100
9. Question
1 point(s)
Which of the following procedures can be used to determine whether or not computer files have been modified?
Correct
Incorrect
Question 10 of 100
10. Question
1 point(s)
Which tool would you use to collect data from wireless packets?
Correct
Incorrect
Question 11 of 100
11. Question
1 point(s)
You work as a company’s security officer. You received an IDS alert indicating that one of your Intranet PCs is connected to a blacklisted Internet IP address (C2 Server). Just before the notice, the IP address was blacklisted. You have launched an investigation to assess the severity of the situation. Which of the following items should be investigated?
Correct
Incorrect
Question 12 of 100
12. Question
1 point(s)
The network administrator of a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
Correct
Incorrect
Question 13 of 100
13. Question
1 point(s)
According to log monitoring programs that do behavioral analysis, several suspect logins on a Linux server occurred during non-business hours. After a closer look at all the login actions, it is clear that none occurred during normal working hours. A Linux administrator examining the issue discovers that the Linux server’s system time is off by more than twelve hours. What time-synchronization protocol on Linux servers has stopped working?
Correct
Incorrect
Question 14 of 100
14. Question
1 point(s)
In NMAP, which command-line switch would be used to detect the operating system?
Correct
Incorrect
Question 15 of 100
15. Question
1 point(s)
Which Intrusion Detection System is best suited for large situations where vital network assets require extra protection and are suitable for monitoring sensitive network segments?
Correct
Incorrect
Question 16 of 100
16. Question
1 point(s)
Which utility can be used to copy files from USB devices invisibly?
Correct
Incorrect
Question 17 of 100
17. Question
1 point(s)
The following is an excerpt from a log file collected from a network machine with the IP address 192.168.1.106:
What kind of action was recorded?
Correct
Incorrect
Question 18 of 100
18. Question
1 point(s)
What is a denial-of-service attack, and how does it work?
Correct
Incorrect
Question 19 of 100
19. Question
1 point(s)
Which form of security document has explicit step-by-step instructions?
Correct
Incorrect
Question 20 of 100
20. Question
1 point(s)
Why would an attacker want to do a port 137 scan?
Correct
Incorrect
Question 21 of 100
21. Question
1 point(s)
Which of the following is a two-factor authentication example?
Correct
Incorrect
Question 22 of 100
22. Question
1 point(s)
Which of the following is the most effective method of preventing network sniffing?
Correct
Incorrect
Question 23 of 100
23. Question
1 point(s)
Anthony completed a C programming course and developed a simple C application to monitor network traffic and provide alerts when any origin delivers “many” IP packets, depending on the average number of packets delivered by all origins and specific thresholds.
In terms of concept, Anthony’s solution is as follows ___________.
Correct
Incorrect
Question 24 of 100
24. Question
1 point(s)
A server’s NMAP scan reveals that port 25 is open. What dangers might this entail?
Correct
Incorrect
Question 25 of 100
25. Question
1 point(s)
Which of the following problems may Wireshark be used to solve?
Correct
Incorrect
Question 26 of 100
26. Question
1 point(s)
Even if all theoretically possible safety precautions are implemented, what level of danger will remain?
Correct
Incorrect
Question 27 of 100
27. Question
1 point(s)
Peter uses the hacking program “SIDExtractor” to extract the SIDs list from a Windows 2000 Server computer. The output of the SIDs is shown below.
Select the user account with System Administrator rights from the list above
Correct
Incorrect
Question 28 of 100
28. Question
1 point(s)
A destination host gets a SYN (synchronize/start) packet from a source host and responds with an SYN/ACK packet when a proper TCP connection is established (synchronize acknowledged). Before the connection can be formed, the destination host must receive an ACK (acknowledgment) of the SYN/ACK. The “TCP three-way handshake” is what it’s called. A connection queue of finite size on the destination host keeps track of connections waiting to be completed while waiting for the ACK to the SYN-ACK. Because the ACK is expected to come a few milliseconds after the SYN-ACK, this queue usually clears fast.
How would an attacker use a TCP SYN attack to take advantage of this design?
Correct
Incorrect
Question 29 of 100
29. Question
1 point(s)
A server’s NMAP scan reveals that port 69 is open. What dangers might this entail?
Correct
Incorrect
Question 30 of 100
30. Question
1 point(s)
Which physical traits are least likely to be used in a large company’s biometric control system?
Correct
Incorrect
Question 31 of 100
31. Question
1 point(s)
Which IPsec component is responsible for protocol-level functions such as encrypting and decrypting packets?
Correct
Incorrect
Question 32 of 100
32. Question
1 point(s)
A modest healthcare provider engaged your firm to analyze the network’s technological capabilities.
What is the most effective method for detecting vulnerabilities on a Windows computer?
Correct
Incorrect
Question 33 of 100
33. Question
1 point(s)
Which IPsec mode should you use to ensure data security and secrecy within a LAN?
Correct
Incorrect
Question 34 of 100
34. Question
1 point(s)
Which tools do extensive testing on web servers, including malware and CGIs?
Correct
Incorrect
Question 35 of 100
35. Question
1 point(s)
A simple dictionary attack in the context of password security entails putting a dictionary file (a text file containing dictionary words) into a cracking application like L0phtCrack or John the Ripper and executing it against user accounts discovered by the application. The dictionary attack is more effective when the word and word fragment selection is larger. The brute force method is the most comprehensive but also the slowest. It usually attempts every possible letter and number combination in its automated exploration. What would you term such an attack if you used both brute force and dictionary approaches to generate a variety of words?
Correct
Incorrect
Question 36 of 100
36. Question
1 point(s)
For Active Directory, a corporation uses Windows Server 2003. What is the most efficient method for cracking AD user passwords?
Correct
Incorrect
Question 37 of 100
37. Question
1 point(s)
Threat actors hack a carefully selected website by introducing an exploit, resulting in malware infection, in order to launch an attack against targeted businesses and organizations. The attackers use exploits on well-known and trusted websites that their intended victims are likely to visit. These attacks use zero-day exploits to target unpatched vulnerabilities and carefully select sites to hack. As a result, the targeted entities have little or no protection against these vulnerabilities.
In the scenario, what kind of attack is described?
Correct
Incorrect
Question 38 of 100
38. Question
1 point(s)
Nedved works as an IT Security Manager for a bank in his home nation. Based on an investigation of a suspicious connection from the email server to an unknown IP Address, he discovered that his company’s email server had been hacked.
Before contacting the incident response team, what is the first thing Nedved should do?
Correct
Incorrect
Question 39 of 100
39. Question
1 point(s)
On a Windows NT4 web server, a tester used the msadc.pl, attack script to run arbitrary instructions. While it is effective, the tester finds performing extended functions to be tedious. Further investigation led to the discovery of a perl script that performs the following msadc functions:
Which exploit does this script point to?
Correct
Incorrect
Question 40 of 100
40. Question
1 point(s)
Which of the following is happening in the two screenshots below?
Correct
Incorrect
Question 41 of 100
41. Question
1 point(s)
What tool can listen to network traffic and crack Windows SMB passwords?
Correct
Incorrect
Question 42 of 100
42. Question
1 point(s)
What is the difference between AES and RSA encryption algorithms?
Correct
Incorrect
Question 43 of 100
43. Question
1 point(s)
What is the LDAP protocol’s port number?
Correct
Incorrect
Question 44 of 100
44. Question
1 point(s)
Which of the following jailbreaking methods gives user-level access but not iboot-level access?
Correct
Incorrect
Question 45 of 100
45. Question
1 point(s)
Using the Nmap syntax, Jack attempted to fingerprint all machines on the network:
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx QUITTING! Clearly, it is not going to work. What exactly is the problem here?
Correct
Incorrect
Question 46 of 100
46. Question
1 point(s)
What were the results of the following commands?
Correct
Incorrect
Question 47 of 100
47. Question
1 point(s)
Which of the following encryption levels does WPA2 use for wireless data encryption?
Correct
Incorrect
Question 48 of 100
48. Question
1 point(s)
You notice that people can telnet into the SMTP server on port 25 when looking through audit logs. You want to stop it, even though there is no evidence of an attack or other wrongdoing. However, you are apprehensive about harming the email server’s usual operation. Choose the best option for achieving this goal from the list below.
Correct
Incorrect
Question 49 of 100
49. Question
1 point(s)
You are working on a buffer overflow exploit and want to include a 200-byte NOP sled in the exploit.c
What does the NOP instruction’s hexadecimal value mean?
Correct
Incorrect
Question 50 of 100
50. Question
1 point(s)
A virus that tries to install itself inside the infected file is referred to as a _____________.
Correct
Incorrect
Question 51 of 100
51. Question
1 point(s)
The security officer has requested that Todd purchase a counter-based authentication system. Which of the following statements best describes this system?
Correct
Incorrect
Question 52 of 100
52. Question
1 point(s)
Which NMAP command combination would allow a tester to fingerprint and service detect any TCP port on a class C network that is obstructing ICMP?
Correct
Incorrect
Question 53 of 100
53. Question
1 point(s)
Port scanning can be used as part of a technical evaluation to discover network vulnerabilities. The TCP XMAS scan is utilized on the targeted machine to locate listening ports. What happens if a scanned port is open?
Correct
Incorrect
Question 54 of 100
54. Question
1 point(s)
Which security element prevents automobiles from crashing through a building’s doors?
Correct
Incorrect
Question 55 of 100
55. Question
1 point(s)
Which programs are most commonly used to promote Microsoft Office products?
Correct
Incorrect
Question 56 of 100
56. Question
1 point(s)
An engineer is using the exploit tool Backtrack to learn how to create exploits in C++. The engineer wants to compile the most recent C++ exploit and give it the name calc.exe. To accomplish this, what command would the engineer use?
Correct
Incorrect
Question 57 of 100
57. Question
1 point(s)
A network administrator has been notified by an Intrusion Detection System (IDS) about a potentially harmful sequence of packets transmitted to a Web server in the network’s external DMZ. The packet traffic was recorded and saved to a PCAP file by the IDS.
What network tool can be utilized to determine if these packets are malicious or just a false positive?
Correct
Incorrect
Question 58 of 100
58. Question
1 point(s)
A specific sort of Trojan has infected a server. It was intended for the hacker to use it to send and host spam emails. What kind of Trojan was used by the hacker?
Correct
Incorrect
Question 59 of 100
59. Question
1 point(s)
ABC’s security administrator must allow Internet traffic through host 10.0.0.2 and UDP traffic through host 10.0.0.3. He must also allow all FTP traffic to the rest of the network while blocking all other traffic. Nobody can access the ftp after he applied his ACL setup to the router, and the approved hosts cannot access the Internet. According to the following configuration, what is going on in the network.
Correct
Incorrect
Question 60 of 100
60. Question
1 point(s)
What will the output of the following command be?
‘NMAP -sS -O -p 123-153 192.168.100.3’
Correct
Incorrect
Question 61 of 100
61. Question
1 point(s)
What is the meaning of type 3 code 13? (Choose two)
Correct
Incorrect
Question 62 of 100
62. Question
1 point(s)
Which access control approach allows numerous systems to use a Central Authentication Server (CAS) to grant users access to multiple systems after a single authentication?
Correct
Incorrect
Question 63 of 100
63. Question
1 point(s)
A hacker is trying to figure out which ports on a network have been left open. The hacker would utilize which NMAP switch?
Correct
Incorrect
Question 64 of 100
64. Question
1 point(s)
The output from a penetration tester’s machine attacking a machine with the IP address 192.168.1.106 looks like this:
What is the most likely scenario?
Correct
Incorrect
Question 65 of 100
65. Question
1 point(s)
XYZ has requested that you evaluate the security of their perimeter email gateway. You compose a specially structured email message and transmit it via the Internet to an employee of Company XYZ from your New York office. Your test is known to an employee of Company XYZ.
This is how your email message appears:
From: [email protected]
To: [email protected]
Subject: Test message
Date: 4/3/2021 14:36
An employee of Company receives your email message XYZ.
What does this demonstrate about Company XYZ’s email gateway?
Correct
Incorrect
Question 66 of 100
66. Question
1 point(s)
Which of the LM hashes below represents a password with less than eight characters? (Choose two options)
Correct
Incorrect
Question 67 of 100
67. Question
1 point(s)
In an attempt to crash the program, a software tester generates erroneous inputs at random. Which of the following is a software testing technique for determining whether or not a software program can handle a wide range of invalid input?
Correct
Incorrect
Question 68 of 100
68. Question
1 point(s)
Which technology is used to format information in SOAP services?
Correct
Incorrect
Question 69 of 100
69. Question
1 point(s)
Which sniffing technique is commonly referred to as a MiTM attack?
Correct
Incorrect
Question 70 of 100
70. Question
1 point(s)
Which IPsec mode should you use when data security and secrecy within the same LAN are critical?
Correct
Incorrect
Question 71 of 100
71. Question
1 point(s)
You are doing an internal security audit and want to know which ports are open on all of the servers. What is the most efficient way to figure this out?
Correct
Incorrect
Question 72 of 100
72. Question
1 point(s)
Session splicing is an IDS evasion technique in which the attacker sends data to the target computer in many tiny packets, making it harder for the IDS to detect the attack signatures.
Session splicing attacks can be carried out with which tool?
Correct
Incorrect
Question 73 of 100
73. Question
1 point(s)
A bank engaged a penetration tester to conduct a penetration test. The tester began looking for IP ranges owned by the bank, performing DNS lookups on the bank’s servers, reading news articles about the bank online, watching when bank employees arrive and depart, searching the bank’s job postings (paying special attention to IT-related jobs), and visiting the bank’s corporate office dumpster. At which stage of the penetration test is the tester now?
Correct
Incorrect
Question 74 of 100
74. Question
1 point(s)
Which of the following is an example of an advanced encryption standard?
Correct
Incorrect
Question 75 of 100
75. Question
1 point(s)
To accomplish a zone transfer, which of the following tools can be used?
Correct
Incorrect
Question 76 of 100
76. Question
1 point(s)
You can use a smart card and pin for two-factor authentication that meets the following requirements: _____________.
Correct
Incorrect
Question 77 of 100
77. Question
1 point(s)
Credit card numbers have been included in the data that your company backs up on tape. Which of the following is the best practice for your company to follow?
Correct
Incorrect
Question 78 of 100
78. Question
1 point(s)
A penetration test is what you are doing. You gained access with a buffer overflow hack and proceeded to look for interesting data, such as usernames and passwords in files. You discover a hidden folder containing the administrator’s bank account password and bitcoin account login information.
So, what are your options?
Correct
Incorrect
Question 79 of 100
79. Question
1 point(s)
According to corporate policy, employees must send files using protocols that encrypt communication. Because employees dislike change, you assume that some employees are still transferring files over unencrypted protocols. You’ve set up a network sniffer to gather traffic from the data intake department’s employees’ laptops. Which command may be used as a display filter to discover unencrypted file transfers when using Wire shark to analyze the collected traffic?
Correct
Incorrect
Question 80 of 100
80. Question
1 point(s)
When certain TPNQM SA subscribers attempted to access the TPNQM main site, they were diverted to a fraudulent site. Anthony, a system administrator at TPNQM SA, discovered TPNQM SA’s DNS Cache Poisoning.
What advice does Anthony have for dealing with a threat like this?
Correct
Incorrect
Question 81 of 100
81. Question
1 point(s)
An IS auditor discovered no written security procedures during a security audit of IT activities. What is the role of the IS auditor?
Correct
Incorrect
Question 82 of 100
82. Question
1 point(s)
The Web development team at a corporation has discovered a certain type of security flaw in their Web software. To reduce the risk of this vulnerability being exploited, the team wishes to change the software requirements so that customers cannot add HTML to their Web applications.
What kind of Web application vulnerability does their program most likely have?
Correct
Incorrect
Question 83 of 100
83. Question
1 point(s)
Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
Correct
Incorrect
Question 84 of 100
84. Question
1 point(s)
Which service in a PKI will vouch for the identity of an individual or company?
Correct
Incorrect
Question 85 of 100
85. Question
1 point(s)
It is a flaw in the GNU bash shell that was found in September 2014 that allows attackers to run remote commands on a susceptible system. The malicious software can take control of an infected machine, disrupt websites with denial-of-service attacks, and scan for other vulnerable machines (including routers).
Which of the following security flaws is being discussed?
Correct
Incorrect
Question 86 of 100
86. Question
1 point(s)
What term was coined to describe the process of tracking, recording, and resolving events in a business?
Correct
Incorrect
Question 87 of 100
87. Question
1 point(s)
Windows file servers are frequently used to store sensitive files, databases, passwords, and other information. Which of the following is a common vulnerability that they are usually exposed to?
Correct
Incorrect
Question 88 of 100
88. Question
1 point(s)
Examine the following log extract to determine the source of the attack.
Correct
Incorrect
Question 89 of 100
89. Question
1 point(s)
Cracking programs are used to recover passwords and reverse the hashing process. (True/False)
Correct
Incorrect
Question 90 of 100
90. Question
1 point(s)
What does a firewall look for to prohibit packets from entering an organization through specific ports and applications?
Correct
Incorrect
Question 91 of 100
91. Question
1 point(s)
You come across the following while evaluating the results of a scanning run against a target network:
Which of the following methods can be used to obtain this result?
Correct
Incorrect
Question 92 of 100
92. Question
1 point(s)
_____________ is a program that can hide programs from the task manager, as well as files, registry items, and keystrokes.
Correct
Incorrect
Question 93 of 100
93. Question
1 point(s)
Which of the following is a client-server tool that is used to get around firewall checks?
Correct
Incorrect
Question 94 of 100
94. Question
1 point(s)
Which of the following scanning programs is designed particularly to discover potential vulnerabilities in Microsoft Windows products?
Correct
Incorrect
Question 95 of 100
95. Question
1 point(s)
Two-factor authentication is implemented in which set of access control solutions?
Correct
Incorrect
Question 96 of 100
96. Question
1 point(s)
In a subnet of 254 addresses, an attacker is using nmap to perform a ping sweep and port scan.
What is the best order for him to complete these steps?
Correct
Incorrect
Question 97 of 100
97. Question
1 point(s)
Which form of Intrusion Detection System is capable of monitoring and alerting on attacks but not of stopping them?
Correct
Incorrect
Question 98 of 100
98. Question
1 point(s)
What does a “rubber-hose” attack mean in the realm of cryptanalysis?
Correct
Incorrect
Question 99 of 100
99. Question
1 point(s)
An attacker has effectively altered the purchase price of things purchased on the company’s website.
The security admins say the web server and Oracle database have not been directly hacked.
They also checked the logs of the Intrusion Detection System (IDS) and discovered no evidence of an attack. What is the most likely method by which the attacker was able to change the purchase price?
Correct
Incorrect
Question 100 of 100
100. Question
1 point(s)
In the web world, which of the following is a very prevalent IDS evasion technique?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.