From a legal standpoint, what would be troublesome to take this kind of measure?
Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure? A. All of the employees would stop normal work activities B. IT department would be telling employees who the boss […]
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication? A. 113 B. 69 C. 123 D. 161
Which of the following has occurred?
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which […]
In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire
In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account’s confidential files and information. How can he achieve this? A. Privilege Escalation B. Shoulder-Surfing C. Hacking Active Directory D. Port Scanning
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following programs is usually targeted at Microsoft Office products? A. Polymorphic virus B. Multipart virus C. Macro virus D. Stealth virus
Which is the first step followed by Vulnerability Scanners for scanning a network?
Which is the first step followed by Vulnerability Scanners for scanning a network? A. OS Detection B. Firewall detection C. TCP/UDP Port scanning D. Checking if the remote host is alive
Which other option could the tester use to get a response from a host using TCP?
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP? A. Traceroute B. Hping […]
You now have access to the company network. What testing method did you use?
You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email […]
Which of the following is the structure designed to verify and authenticate the identity of individuals within
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange? A. SOA B. biometrics C. single sign on D. PKI
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use? A. –r B. –F C. –P D. –sP