ICMP ping and ping sweeps are used to check for active systems and to check
ICMP ping and ping sweeps are used to check for active systems and to check
which of the following?
A hacker searches in Google for filetype:pcf to find Cisco VPN config files. Those files may contain
connectivity passwords that can be decoded with which of the following?
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
Which command would be used?
A pentester gains acess to a Windows application server and needs to determine the settings of
the built-in Windows firewall. Which command would be used?
What is most likely taking place?
What could be used to successfully sniff the traffic on this switched network?
A tester is attempting to capture and analyze the traffic on a given network and realizes that the
network has several switches. What could be used to successfully sniff the traffic on this switched
network? (Choose three.)
which kind of security vulnerability?
A newly discovered flaw in a software application would be considered which kind of security
vulnerability?
What are the three types of authentication?
What are the three types of authentication?
What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recog
What are the three types of compliance that the Open Source Security Testing Methodology
Manual (OSSTMM) recognizes?
What specific octet within the subnet does the technician see?
While checking the settings on the internet browser, a technician finds that the proxy server
settings have been checked and a computer is trying to use itself as a proxy server. What specific
octet within the subnet does the technician see?