Which of the following is an NMAP script that could hel…
Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD,
PUT, DELETE, TRACE?
What is one of the first things you should do when hired?
One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the shortlisted
pen testers that they may hire. During the interview with the CIO, he emphasized that he wants to totally
eliminate all risks. What is one of the first things you should do when hired?
Which of the following security policies defines the us…
Which of the following security policies defines the use of VPN for gaining access to an internal corporate
network?
when two pieces of data result in the same value is?
There are several ways to gain insight on how a cryptosystem works with the goal of reverse engineering the
process. A term describes when two pieces of data result in the same value is?
This weakness allows stealing the information protected…
Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library. This
weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used
to secure the Internet.
What is the best option to do this job?
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to
monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
What is the code written for?
#!/usr/bin/python
import socket
buffer=[“A”]counter=50
while len(buffer)<=100:
buffer.apend (“A”*counter)
counter=counter+50
commands=
[“HELP”,“STATS.”,“RTIME.”,“LTIME.”,“SRUN.”,“TRUN.”,“GMON.”,“GDOG.”,“KSTET.”,“GTER.”,“HTER.”,“LTER.
”,“KSTAN.”]
for command in commands:
for buffstring in buffer:
print “Exploiting” +command+“:”+str(len(buffstring))
s=socket.socket(socket.AF_INET.socket.SOCK_STREAM)
s.connect((‘127.0.0.1’,9999))
s.recv(50)
s.send(command+buffstring)
s.close()
What is the code written for?
What step in incident handling did you just complete?
It has been reported to you that someone has caused an information spillage on their computer. You go to the
computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in
incident handling did you just complete?
Which program would you use?
You want to analyze packets on your wireless network. Which program would you use?
which OS did it not directly affect?
Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internetfacing services, which OS did it not directly affect?