What is the term coined for logging, recording and reso…
What is the term coined for logging, recording and resolving events in a company?
Which of the following BEST describes the mechanism of …
Which of the following BEST describes the mechanism of a Boot Sector Virus?
which Microsoft Windows workstations has its file shari…
Suppose you’ve gained access to your client’s hybrid network. On which port should you listen to in order to
know which Microsoft Windows workstations has its file sharing enabled?
what does a firewall check?
In order to prevent particular ports and applications from getting packets into an organization, what does a
firewall check?
What should you do?
While you were gathering information as part of security assessments for one of your clients, you were able to
gather data that show your client is involved with fraudulent activities. What should you do?
Which of the following is NOT an ideal choice for biome…
Which of the following is NOT an ideal choice for biometric controls?
you need to analyze extracted metadata from files you c…
What tool should you use when you need to analyze extracted metadata from files you collected when you were
in the initial stage of penetration test (information gathering)?
What could be the case?
You’ve just discovered a server that is currently active within the same network with the machine you recently
compromised. You ping it but it did not respond. What could be the case?
What is the best Nmap command to use when you want to l…
What is the best Nmap command to use when you want to list all devices in the same network quickly after you
successfully identified a server whose IP address is 10.10.0.5?
which of the following is the BEST thing to do?
If you are to determine the attack surface of an organization, which of the following is the BEST thing to do?