John, a disgruntled ex-employee of an organization, contacted a professional hacker to
exploit the organization. In the attack process, the professional hacker Installed a scanner
on a machine belonging to one of the vktims and scanned several machines on the same
network to Identify vulnerabilities to perform further exploitation. What is the type of
vulnerability assessment tool employed by John in the above scenario?
A.
Proxy scanner
B.
Agent-based scanner
C.
Network-based scanner
D.
Cluster scanner
Agent-based scanner
The configuration allows a wired or wireless network interface controller to pass all traffic it
receives to the Central Processing Unit (CPU), rather than passing only the frames that the
controller is intended to receive. Which of the following is being described?
A.
Multi-cast mode
B.
Promiscuous mode
C.
WEM
D.
Port forwarding
Promiscuous mode
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
A.
There is no way to tell because a hash cannot be reversed
B.
The right most portion of the hash is always the same
C.
The hash always starts with AB923D
D.
The left most portion of the hash is always the same
E.
A portion of the hash will be all 0's
The right most portion of the hash is always the same
You are a penetration tester and are about to perform a scan on a specific server. The
agreement that you signed with the client contains the following specific condition for the
scan: “The attacker must scan every port on the server several times using a set of
spoofed sources IP addresses. ” Suppose that you are using Nmap to perform this scan.
What flag will you use to satisfy this requirement?
A.
The -A flag
B.
The -g flag
C.
The -f flag
D.
The -D flag
The -g flag
Explanation:
flags –source-port and -g are equivalent and instruct nmap to send packets through a
selected port. this option is used to try to cheat firewalls whitelisting traffic from specific
ports. the following example can scan the target from the port twenty to ports eighty, 22,
21,23 and 25 sending fragmented packets to LinuxHint.
There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution Is for a customer to Join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?
A.
Hybrid
B.
Community
C.
Public
D.
Private
Public
The “Gray-box testing” methodology enforces what kind of restriction?
A.
Only the external operation of a system is accessible to the tester.
B.
The internal operation of a system in only partly accessible to the tester.
C.
Only the internal operation of a system is known to the tester.
D.
The internal operation of a system is completely known to the tester
The internal operation of a system in only partly accessible to the tester.
which of the following Bluetooth hacking techniques refers to the theft of information from a
wireless device through Bluetooth?
A.
Bluesmacking
B.
Bluebugging
C.
Bluejacking
D.
Bluesnarfing
Bluejacking
Explanation: Bluejacking is maybe the foremost common sort of Bluetooth hacking. This
happens once a hacker searches for discoverable devices within the space and so sends
spam within the sort of text messages to the devices. this manner of hacking is very
immature and harmless.
It was once used primarily to prank individuals within the past once mobile devices came
with Bluetooth that was mechanically set to ascertainable. Bluejacking is employed
nowadays for spam electronic communication and also the hackers World Health
Organization use this bonk simply to frustrate others. the tactic doesn’t offer hackers
access to your phone or the knowledge on that.
The best thanks to alter Bluejacking is to ignore the messages if you receive them. If you
retain your Bluetooth settings to “invisible” or “non-discoverable” you’re not going to receive
these messages. Also, keeping your smartphone or device set to “invisible” whereas you’re
in a very busy or open Wi-Fi space. this can forestall Bluejacking and also the next 2 wellliked
styles of hacks.
After an audit, the auditors Inform you that there is a critical finding that you must tackle
Immediately. You read the audit report, and the problem is the service running on port 369.
Which service Is this and how can you tackle the problem?
A.
The service is LDAP. and you must change it to 636. which is LDPAPS.
B.
The service is NTP. and you have to change It from UDP to TCP in order to encrypt it
C.
The findings do not require immediate actions and are only suggestions.
D.
The service is SMTP, and you must change it to SMIME. which is an encrypted way to send emails.
The service is LDAP. and you must change it to 636. which is LDPAPS.
How does a denial-of-service attack work?
A.
A hacker prevents a legitimate user (or group of users) from accessing a service
B.
A hacker uses every character, word, or letter he or she can think of to defeat
authentication
C.
A hacker tries to decipher a password by using a system, which subsequently crashes the network
D.
A hacker attempts to imitate a legitimate user by confusing a computer or even another person
A hacker prevents a legitimate user (or group of users) from accessing a service
Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network.
Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.
A.
SNMPUtil
B.
SNScan
C.
SNMPScan
D.
Solarwinds IP Network Browser
E.
NMap
SNMPUtil
SNScan
Solarwinds IP Network Browser
You are the Network Admin, and you get a complaint that some of the websites are no
longer accessible. You try to ping the servers and find them to be reachable. Then you type
the IP address and then you try on the browser, and find it to be accessible. But they are
not accessible when you try using the URL.
What may be the problem?
A.
Traffic is Blocked on UDP Port 53
B.
Traffic is Blocked on TCP Port 80
C.
Traffic is Blocked on TCP Port 54
D.
Traffic is Blocked on UDP Port 80
Traffic is Blocked on UDP Port 53
What would be the fastest way to perform content enumeration on a given web server by
using the Gobuster tool?
A.
Performing content enumeration using the bruteforce mode and 10 threads
B.
Shipping SSL certificate verification
C.
Performing content enumeration using a wordlist
D.
Performing content enumeration using the bruteforce mode and random file extensions
Performing content enumeration using the bruteforce mode and random file extensions
Page 19 out of 44 Pages |
Previous |