Fill This Form To Receive Instant Help
Homework answers / question archive / Question 1) If you want to mask (or proof) your IP address, what type of scan should you use? Stealth scan IDLE, IPID scan ACK flag probe scan UDP scan Question 2) Which of the following is an Internet Relay Chat bot? EnergyMech SubSeven Netbus Dark Comet Question 3) The following act will help a company become compliant with regulations and standards: Ping scanning Enumeration Vulnerability scanning Replacing Windows systems with Linux Question 4) Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi? War driving War flying War chalking War walking Question 5) Which of the following evasion techniques rely on time-to-live (TTL) fields of a TCP/IP packet? Unicode evasion Obfuscation Denial-of-service attack Insertion attack Question 6) According to your text, components of a cloud broker include which of the following? (choose all that apply) Service aggregation Service arbitration Service intermediation Service negotiation Question 7) Reasons to scan networks include (choose two): Stealing usernames Stealing passwords Identifying hosts Determining open ports Question 8) The network Time Protocol uses which port? 119 123 8080 443 Question 9) Which of the following ports does NTP use as its primary means of communications? UDP port 320 UDP port 161 UDP port 113 UDP port 123 Question 10) What are two advantages to having software as a service (SaaS)? Security Internet dependency Easy administration Low cost Question 11) The following tool extracts documents of an organization from the internet: Cain Metagoofil Netcraft nftables Question 12) A subnet mask of a network is required to perform: A denial-of –service attack on a host Phishing A ping sweep/scan ARP spoofing Question 13) Which of the following enumeration techniques does an attacker use to obtain list of computers that belongs to a domain? SNMP enumeration NTP enumeration SMPT enumeration Netbios enumeration Question 14) A DNS zone transfer (choose two): Uses TCP port 53 Uses UDP port 53 Provides FQDN information about an organization Is possible with Microsoft DNS servers but BIND servers Question 15) Which of the following is true about active stack fingerprinting? Is based on the differential implantation of the stack and the various ways an OS responds to it Is based on the fact that various vendors of OS implement the TCP stack differently TCP connect scan Uses passwords crackers to escalate system privileges Uses sniffing techniques instead of the scanning techniques Question 16) Which of the following protocols are susceptible to sniffing? Kerberos HTTPS SSL Telnet Question 17) Android options to save persistent application data include which of the following? (choose all that apply) Internal storage External storage SQLite databases Networks connection Question 18) A lack of vetting of apps can lead to which two of the following results? Jail-breaking Rooting Fake apps Malicious apps Question 19) Which of the following companies offer cloud computing services? (choose all that apply) Dropbox Facebook Google Salesforce Question 20) Which of the following characteristics applies to the Simple Service Discovery Protocol (SSDP)? (choose all that apply) Can be vulnerable to denial of service Uses multicast addresses Controls communication for the Universal Plug and play and play Service Not work behind a firewall Question 21) What is the size of WEP initializations vector (IV)? 8-bit 16-bit 24-bit 32-bit Question 22) Which of the following is a connect scan? Nmap-sU Nmap-sS Nmap-sT Nmap-sO Question 23) The following is a tool that can be used to harvest credentials from a Windows machine: Mimikatz LOIC WannaCry Hping Question 24) Meterpreter allows the attacker to move laterally by performing which of the following steps: Hashdump Getsystem Route add Load mimkatz Question 25) Using public Internet IP addresses for a penetration test is an example of: External assessment Network-based assessment Internal assessment Host-based assessment Question 26) The following piece of malware is a bot used as a banking Trojan: Dark Comet Zeus Poison lvy LOIC Question 27) Which of the following are SNMP enumeration tools? (choose all that apply) Getif Softperfect Nmap Spiceworks Question 28) Which rootkit modifies the boot sequence to load itself instead of the original virtual machine monitor? Boot loader-level rootkit Hypervisor-level rootkit Library-level rootkit Kernel-level rootkit Question 29) What is the first step in the vulnerability management life cycle? Risk assessment Remediation Monitoring Creating a baseline Question 30) Which of the following IDS detection techniques detects the intrusion based on the fixed behavioral characteristics? Signature recognition Anomaly detection Protocol anomaly detection All of the above Question 31) Fake Defender deleted apk files from which two of the following locations? /users/Download /home/Download /mnt/external_sd/Download /mnt/extSdCard/Download Question 32) According to your text, which of the following are ways to detect an intrusion with an IDS? (choose all that apply) Anomaly detection Antivirus alerts Signature detection Protocol anomaly detection Question 33) Social engineering attack may include any of the following except: Getting information from Facebook Shoulder surfing Phishing Nessus Question 34) The following are all password-cracking tools except: John the Ripper Cain Hashcat Hashcalc Question 35) Which of the following sentences is true about a proxy? Protects the local network from outside access Allows attacker to view the desktop of users system Does not allow the connection of a number of computers to the Internet when having only one IP Cannot be used to filter out unwanted content Question 36) Which of the following are methods to connect smartphones to a network? (choose all that apply) 3G/4G Bluetooth Wired connection Wi-Fi Question 37) Which of the following are some of the main functions of an intrusion detection system (IDS)? (choose all that apply) Performs packet sniffing Blocks rule-based traffic Performs packet analysis Gathers and analyses information from a network Question 38) Black hat hackers are: Individuals who work both offensively and defensively at various times Individuals with extraordinary computing skills, resorting to malicious or destructive activities Individuals professing hacker skills and using them for defensive purpose, or security analysts Individuals who aim to bring down critical infrastructure for a cause and are not worried about jail Question 39) According to the text, characteristics of virtualization in cloud computing technology include which of the following? (choose all that apply) Isolation Partitioning Wireless capable Encapsulation Question 40) Which of the following is an example of a Trojan that can be used for website defacement? WGET HTTrack Restorator CrimePack Question 41) At which layer of the OSI model do MAC addresses operate? Network Application Presentation Physical Transport Session Data link Question 42) The website netcraft
Question 1) If you want to mask (or proof) your IP address, what type of scan should you use?
Question 2) Which of the following is an Internet Relay Chat bot?
Question 3) The following act will help a company become compliant with regulations and standards:
Question 4) Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi?
Question 5) Which of the following evasion techniques rely on time-to-live (TTL) fields of a TCP/IP packet?
Question 6) According to your text, components of a cloud broker include which of the following? (choose all that apply)
Question 7) Reasons to scan networks include (choose two):
Question 8) The network Time Protocol uses which port?
Question 9) Which of the following ports does NTP use as its primary means of communications?
Question 10) What are two advantages to having software as a service (SaaS)?
Question 11) The following tool extracts documents of an organization from the internet:
Question 12) A subnet mask of a network is required to perform:
Question 13) Which of the following enumeration techniques does an attacker use to obtain list of computers that belongs to a domain?
Question 14) A DNS zone transfer (choose two):
Question 15) Which of the following is true about active stack fingerprinting?
Question 16) Which of the following protocols are susceptible to sniffing?
Question 17) Android options to save persistent application data include which of the following? (choose all that apply)
Question 18) A lack of vetting of apps can lead to which two of the following results?
Question 19) Which of the following companies offer cloud computing services? (choose all that apply)
Question 20) Which of the following characteristics applies to the Simple Service Discovery Protocol (SSDP)? (choose all that apply)
Question 21) What is the size of WEP initializations vector (IV)?
Question 22) Which of the following is a connect scan?
Question 23) The following is a tool that can be used to harvest credentials from a Windows machine:
Question 24) Meterpreter allows the attacker to move laterally by performing which of the following steps:
Question 25) Using public Internet IP addresses for a penetration test is an example of:
Question 26) The following piece of malware is a bot used as a banking Trojan:
Question 27) Which of the following are SNMP enumeration tools? (choose all that apply)
Question 28) Which rootkit modifies the boot sequence to load itself instead of the original virtual machine monitor?
Question 29) What is the first step in the vulnerability management life cycle?
Question 30) Which of the following IDS detection techniques detects the intrusion based on the fixed behavioral characteristics?
Question 31) Fake Defender deleted apk files from which two of the following locations?
Question 32) According to your text, which of the following are ways to detect an intrusion with an IDS? (choose all that apply)
Question 33) Social engineering attack may include any of the following except:
Question 34) The following are all password-cracking tools except:
Question 35) Which of the following sentences is true about a proxy?
Question 36) Which of the following are methods to connect smartphones to a network? (choose all that apply)
Question 37) Which of the following are some of the main functions of an intrusion detection system (IDS)? (choose all that apply)
Question 38) Black hat hackers are:
Question 39) According to the text, characteristics of virtualization in cloud computing technology include which of the following? (choose all that apply)
Question 40) Which of the following is an example of a Trojan that can be used for website defacement?
Question 41) At which layer of the OSI model do MAC addresses operate?
Question 42) The website netcraft.com is good for
Question 43) Which of the following Windows Utilities can be used to enumerate hosts?
Question 44) Which of the following IP spoofing detection techniques succeeds only when the attacker is in a different subnet?
Question 45) WPA enhances WEP by changing temporal keys every ____.
Question 46) According to your text, examples of malware include which of the following? (choose all that apply)
Question 47) Which layer of the OSI model is responsible for encryption and compression?
Question 48) An organization can implement this cloud deployment model within the corporate firewall.
Question 49) Which of the following are disadvantages of signature detection? (choose all that apply)
Question 50) According to the text, the three different types of virtualization include:
Question 51) SYN flooding takes advantage of which of the following? (choose all that apply)
Question 52) The following is a well-known variant of ransomware:
Question 53) At which layer of the OSI model do IP addresses operate?
Question 54) Which of the following can be used as a traceroute tool?
Question 55) The management information base (MIB) includes which of the following? (choose all that apply)
Question 56) Your supervisor is concerned about the use of port 139 in your environment. What measure do you recommend talking to deal with the security risk?
Question 57) Which of the following below accurately describes Transmission Control Protocol? (choose all that apply)
Question 58) The verification phase of the vulnerability management life cycle allows for:
Question 59) Identify the statement that is true for the RC6 algorithm:
Question 60) Which of the following is true about the 802.11 standard?
Question 61) The act enumerating hosts is (choose two):
Question 62) Select the three IP protocols that Snort supports for suspicious behaviour according to your text:
Question 63) Using websites like mxtoolbox.com that provide top-level domains and subdomains is and example of:
Question 64) According to the text, which of the following will protect by limiting the ability to access resources?
Question 65) Which of the following ports are associated with NETBIOS? (choose all the apply)
Question 66) Which of the following are LDAP enumeration tools? (choose all that apply)
Question 67) The technique of hiding data in a picture or an audio file in another file is known as:
Question 68) Rainbow tables are extremely effective for cracking:
Question 69) All of the following are true about Trivial File Transfer Protocol (TFTP), expect (choose one):
Question 70) Android includes media support for which of the following? (choose all that apply)
Question 71) ARP spoofing involves constructing a large number of forged ARP request and reply packets to overload:
Question 72) Which of the following is an antenna based on the principle of a satellite dish and can pick up Wi-Fi signals from 10 miles away?
Question 73) Lightweight Directory Access Protocol uses which port?
Question 74) Which version of Wired Equivalent Privacy (WEP) uses a 104-bit key size?
Question 75) What are some of the limitations of cloud computing services? (choose all that apply)
Question 76) The autorun feature of removable disks and CD drives can be a threat to network security. What is the best course of action to remove autorun for removable disks and CD drives in Windows?
Question 77) Signs of intrusions include which of the following? (choose all that apply?
Question 78) When a distributed reflective denial-of-service attack (DRDoS) is used, which two of the following occurs?
Question 79) How do you filter for NTP traffic in Wireshark?
Question 80) The following are all example of nonelectronic attacks: (choose all that apply)
Question 81) What is the last step in the vulnerability management life cycle?
Question 82) Enumerating the network will determine all but:
Question 83) Which of the following is not a type of password-cracking attack?
Question 84) The baselining phase of the vulnerability management life cycle allows for:
Question 85) An SSID for a wireless network can be a maximum of
Question 86) Which cloud consumer model includes storage, service management, and content delivery?
Question 87) Tracert counts the number of _____ to a destination IP address.
Question 88) Which of the following are tools used for footprinting? (choose all that apply)
Question 89) All of the statements below are characteristics of Wireshark except:
Question 90) Which of the following techniques practiced by an attacker exploits human behavior to make attacks?
Question 91) The IEEE 802.16 standard is known as:
Question 92) Which of these is an example of passive footprinting?
Question 93) A misconfiguration can include all but the following:
Question 94) Looking at MAC addresses and SSIDs is an example of which of the following assessment types?
Question 95) Which of the following are characteristics of cloud computing services? (choose all that apply)
Question 96) What does SSL strip do? (choose all that apply)
Question 97) Permutation scanning involves which of the following?
Question 98) Which of the following scans only works if the operating system’s TCP/IP implementation is based on RFC 793?
Question 99) The components of IPsec include all but:
Question 100) The following protocols often use clear text:
Question 101) Which of the following are service models available to cloud consumers? (choose all that apply)
Question 102) The security Account Manager (SAM) database contains:
Question 103) The remediation phase of the vulnerability management life cycle allows for:
Question 104) UDP is considered (choose two):
Question 105) A computer can reach other hosts on the 10.10.10.0/24 network, but not the internet.
What is likely the technical issue?
Question 106) Of the following, which two are purposes of malware?
Question 107) Which two tools are well-known vulnerability scanners?
Question 108) App stores include (choose three):
Question 109) What type of social engineering might have the person looking in the back of a company’s facility?
Question 110) The website archive.org has
Question 111) According to OWASP, which of the following are secure coding techniques? (choose all that apply)
Question 112) The tool hping can be used for:
Question 113) Footprinting tools will help gather the following information about a target: (choose all that apply)
Question 114) Which layer of the OSI model do port numbers get assigned?
Question 115) Which of the following Bluetooth attacks refers to sending unsolicited messages over Bluetooth to Bluetooth-enabled?
Question 116) Which of the following applies to an SSID? (choose all that apply)
Question 117) Examining network devices for settings and configurations is an example of:
Question 118) The following is an attack vector due to a code vulnerability that is present:
Question 119) Which password-cracking technique will the attacker use if he/she gets some information about the password to crack?
Question 120) Which of the following is an antenna used in wireless base stations and provides a 360-degree horizontal radiation pattern?
Question 121) The following are well-known variants of ransomware:
Question 122) This type of denial-of-service attack involves the use of multiple intermediary and secondary machines to contribute to the attack against the target system.
Question 123) Which of the following are types of database attacks? (choose all that apply)
Question 124) The psexec utility can be used to perform which of the following actions?
Question 125) Identify the attack which forces an unsuspecting user’s browser to send malicious requests the user did not intend?
Already member? Sign In