How will the pentester pivot using Metasploit?
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester
pivot using Metasploit?
Which of the following actions should the security administrator take?
A company has hired a security administrator to maintain and administer Linux and Windowsbased systems. Written in the nightly report file is the followinG.
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours
later the size has decreased considerably. Another hour goes by and the log files have shrunk in
size again.
Which of the following actions should the security administrator take?
Which NMAP switch would the hacker use?
A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP
switch would the hacker use?
which command could be used to list the running services?
At a Windows Server command prompt, which command could be used to list the running
services?
Which of the following is optimized for confidential communications, such as bidirectional voice and video?
Which of the following is optimized for confidential communications, such as bidirectional voice
and video?
which of the following vulnerabilities?
The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces
which of the following vulnerabilities?
Which of the following is considered an acceptable option when managing a risk?
Which of the following is considered an acceptable option when managing a risk?
Which of the following is the most secure encryption protocol that the network administrator should recommend?
A person approaches a network administrator and wants advice on how to send encrypted email
from home. The end user does not want to have to pay for any license fees or manage server
services. Which of the following is the most secure encryption protocol that the network
administrator should recommend?
You can always defend yourself by "ignorance of the law" clause.
A company is legally liable for the content of email that is sent from its systems, regardless of
whether the message was sent for private or business-related purposes. This could lead to
prosecution for the sender and for the company’s directors if, for example, outgoing email was
found to contain material that was pornographic, racist, or likely to incite someone to commit an
act of terrorism. You can always defend yourself by “ignorance of the law” clause.
__________ is found in all versions of NTFS and is described as the ability to fork file data into existing fi
__________ is found in all versions of NTFS and is described as the ability to fork file data into
existing files without affecting their functionality, size, or display to traditional file browsing utilities
like dir or Windows Explorer