Which type of attack did the consultant perform?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?
which of the following problems?
Low humidity in a data center can cause which of the following problems?
How can telnet be used to fingerprint a web server?
How can telnet be used to fingerprint a web server?
Which property ensures that a hash function will not pr…
Which property ensures that a hash function will not produce the same hashed value for two different
messages?
Which cryptography attack is the student attempting?
A computer science student needs to fill some information into a secured Adobe PDF job application that was
received from a prospective employer. Instead of requesting a new document that allowed the forms to be
completed, the student decides to write a script that pulls passwords from a list of commonly used passwords
to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?
Which of the following is a symmetric cryptographic sta…
Which of the following is a symmetric cryptographic standard?
which of the following layers of the OSI Model?
A circuit level gateway works at which of the following layers of the OSI Model?
Which rule would best fit this requirement?
A company firewall engineer has configured a new DMZ to allow public systems to be located away from the
internal network. The engineer has three security zones set:
Untrust (Internet) – (Remote network = 217.77.88.0/24)
DMZ (DMZ) – (11.12.13.0/24)
Trust (Intranet) – (192.168.0.0/24)
The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote
desktop server in the DMZ. Which rule would best fit this requirement?
Which type of firewall is the tester trying to traverse?
While conducting a penetration test, the tester determines that there is a firewall between the tester’s machine
and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the
OSI model. Which type of firewall is the tester trying to traverse?
Which of the following choices would be a common vulner…
Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following
choices would be a common vulnerability that usually exposes them?