Which type of attack did the consultant perform?
A consultant is hired to do physical penetration testing at a large financial company. In the first day
of his assessment, the consultant goes to the company`s building dressed like an electrician and
waits in the lobby for an employee to pass through the main access gate, then the consultant
follows the employee behind to get into the restricted area. Which type of attack did the consultant
perform?
How will the pentester pivot using Metasploit?
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester
pivot using Metasploit?
Which of the following actions should the security administrator take?
A company has hired a security administrator to maintain and administer Linux and Windowsbased systems. Written in the nightly report file is the followinG.
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours
later the size has decreased considerably. Another hour goes by and the log files have shrunk in
size again.
Which of the following actions should the security administrator take?
Which NMAP switch would the hacker use?
A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP
switch would the hacker use?
What is the First Step required in preparing a computer for forensics investigation?
What is the First Step required in preparing a computer for forensics investigation?
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic a
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.
Which of the following commands shows you the names of all open shared files on a server and number of file lo
Which of the following commands shows you the names of all open shared files on a server and
number of file locks on each file?
Which of the following files contains records that correspond to each deleted file in the Recycle Bin?
The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve
and restore files. Once the file is moved to the recycle bin, a record is added to the log file that
exists in the Recycle Bin.
Which of the following files contains records that correspond to each deleted file in the Recycle
Bin?
Which of the following statements is correct while dealing with local archives?
Email archiving is a systematic approach to save and protect the data contained in emails so that
it can be accessed fast at a later date. There are two main archive types, namely Local Archive
and Server Storage Archive. Which of the following statements is correct while dealing with local
archives?
Which of the following commands shows you all of the network services running on Windowsbased servers?
Which of the following commands shows you all of the network services running on Windowsbased servers?