Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Question 1) If you want to mask (or proof) your IP address, what type of scan should you use? Stealth scan IDLE, IPID scan ACK flag probe scan UDP scan Question 2) Which of the following is an Internet Relay Chat bot? EnergyMech SubSeven Netbus Dark Comet Question 3) The following act will help a company become compliant with regulations and standards: Ping scanning Enumeration Vulnerability scanning Replacing Windows systems with Linux Question 4) Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi? War driving War flying War chalking War walking Question 5) Which of the following evasion techniques rely on time-to-live (TTL) fields of a TCP/IP packet? Unicode evasion Obfuscation Denial-of-service attack Insertion attack Question 6) According to your text, components of a cloud broker include which of the following? (choose all that apply) Service aggregation Service arbitration Service intermediation Service negotiation Question 7) Reasons to scan networks include (choose two): Stealing usernames Stealing passwords Identifying hosts Determining open ports Question 8) The network Time Protocol uses which port? 119 123 8080 443 Question 9) Which of the following ports does NTP use as its primary means of communications? UDP port 320 UDP port 161 UDP port 113 UDP port 123 Question 10) What are two advantages to having software as a service (SaaS)? Security Internet dependency Easy administration Low cost Question 11) The following tool extracts documents of an organization from the internet: Cain Metagoofil Netcraft nftables Question 12) A subnet mask of a network is required to perform: A denial-of –service attack on a host Phishing A ping sweep/scan ARP spoofing Question 13) Which of the following enumeration techniques does an attacker use to obtain list of computers that belongs to a domain? SNMP enumeration NTP enumeration SMPT enumeration Netbios enumeration Question 14) A DNS zone transfer (choose two): Uses TCP port 53 Uses UDP port 53 Provides FQDN information about an organization Is possible with Microsoft DNS servers but BIND servers Question 15) Which of the following is true about active stack fingerprinting? Is based on the differential implantation of the stack and the various ways an OS responds to it Is based on the fact that various vendors of OS implement the TCP stack differently TCP connect scan Uses passwords crackers to escalate system privileges Uses sniffing techniques instead of the scanning techniques Question 16) Which of the following protocols are susceptible to sniffing? Kerberos HTTPS SSL Telnet Question 17) Android options to save persistent application data include which of the following? (choose all that apply) Internal storage External storage SQLite databases Networks connection Question 18) A lack of vetting of apps can lead to which two of the following results? Jail-breaking Rooting Fake apps Malicious apps Question 19) Which of the following companies offer cloud computing services? (choose all that apply) Dropbox Facebook Google Salesforce Question 20) Which of the following characteristics applies to the Simple Service Discovery Protocol (SSDP)? (choose all that apply) Can be vulnerable to denial of service Uses multicast addresses Controls communication for the Universal Plug and play and play Service Not work behind a firewall Question 21) What is the size of WEP initializations vector (IV)? 8-bit 16-bit 24-bit 32-bit Question 22) Which of the following is a connect scan? Nmap-sU Nmap-sS Nmap-sT Nmap-sO Question 23) The following is a tool that can be used to harvest credentials from a Windows machine: Mimikatz LOIC WannaCry Hping Question 24) Meterpreter allows the attacker to move laterally by performing which of the following steps: Hashdump Getsystem Route add Load mimkatz Question 25) Using public Internet IP addresses for a penetration test is an example of: External assessment Network-based assessment Internal assessment Host-based assessment Question 26) The following piece of malware is a bot used as a banking Trojan: Dark Comet Zeus Poison lvy LOIC Question 27) Which of the following are SNMP enumeration tools? (choose all that apply) Getif Softperfect Nmap Spiceworks Question 28) Which rootkit modifies the boot sequence to load itself instead of the original virtual machine monitor? Boot loader-level rootkit Hypervisor-level rootkit Library-level rootkit Kernel-level rootkit Question 29) What is the first step in the vulnerability management life cycle? Risk assessment Remediation Monitoring Creating a baseline Question 30) Which of the following IDS detection techniques detects the intrusion based on the fixed behavioral characteristics? Signature recognition Anomaly detection Protocol anomaly detection All of the above Question 31) Fake Defender deleted apk files from which two of the following locations? /users/Download /home/Download /mnt/external_sd/Download /mnt/extSdCard/Download Question 32) According to your text, which of the following are ways to detect an intrusion with an IDS? (choose all that apply) Anomaly detection Antivirus alerts Signature detection Protocol anomaly detection Question 33) Social engineering attack may include any of the following except: Getting information from Facebook Shoulder surfing Phishing Nessus Question 34) The following are all password-cracking tools except: John the Ripper Cain Hashcat Hashcalc Question 35) Which of the following sentences is true about a proxy? Protects the local network from outside access Allows attacker to view the desktop of users system Does not allow the connection of a number of computers to the Internet when having only one IP Cannot be used to filter out unwanted content Question 36) Which of the following are methods to connect smartphones to a network? (choose all that apply) 3G/4G Bluetooth Wired connection Wi-Fi Question 37) Which of the following are some of the main functions of an intrusion detection system (IDS)? (choose all that apply) Performs packet sniffing Blocks rule-based traffic Performs packet analysis Gathers and analyses information from a network Question 38) Black hat hackers are: Individuals who work both offensively and defensively at various times Individuals with extraordinary computing skills, resorting to malicious or destructive activities Individuals professing hacker skills and using them for defensive purpose, or security analysts Individuals who aim to bring down critical infrastructure for a cause and are not worried about jail Question 39) According to the text, characteristics of virtualization in cloud computing technology include which of the following? (choose all that apply) Isolation Partitioning Wireless capable Encapsulation Question 40) Which of the following is an example of a Trojan that can be used for website defacement? WGET HTTrack Restorator CrimePack Question 41) At which layer of the OSI model do MAC addresses operate? Network Application Presentation Physical Transport Session Data link Question 42) The website netcraft
Question 1) If you want to mask (or proof) your IP address, what type of scan should you use?
- Stealth scan
- IDLE, IPID scan
- ACK flag probe scan
- UDP scan
Question 2) Which of the following is an Internet Relay Chat bot?
- EnergyMech
- SubSeven
- Netbus
- Dark Comet
Question 3) The following act will help a company become compliant with regulations and standards:
- Ping scanning
- Enumeration
- Vulnerability scanning
- Replacing Windows systems with Linux
Question 4) Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi?
- War driving
- War flying
- War chalking
- War walking
Question 5) Which of the following evasion techniques rely on time-to-live (TTL) fields of a TCP/IP packet?
- Unicode evasion
- Obfuscation
- Denial-of-service attack
- Insertion attack
Question 6) According to your text, components of a cloud broker include which of the following? (choose all that apply)
- Service aggregation
- Service arbitration
- Service intermediation
- Service negotiation
Question 7) Reasons to scan networks include (choose two):
- Stealing usernames
- Stealing passwords
- Identifying hosts
- Determining open ports
Question 8) The network Time Protocol uses which port?
- 119
- 123
- 8080
- 443
Question 9) Which of the following ports does NTP use as its primary means of communications?
- UDP port 320
- UDP port 161
- UDP port 113
- UDP port 123
Question 10) What are two advantages to having software as a service (SaaS)?
- Security
- Internet dependency
- Easy administration
- Low cost
Question 11) The following tool extracts documents of an organization from the internet:
- Cain
- Metagoofil
- Netcraft
- nftables
Question 12) A subnet mask of a network is required to perform:
- A denial-of –service attack on a host
- Phishing
- A ping sweep/scan
- ARP spoofing
Question 13) Which of the following enumeration techniques does an attacker use to obtain list of computers that belongs to a domain?
- SNMP enumeration
- NTP enumeration
- SMPT enumeration
- Netbios enumeration
Question 14) A DNS zone transfer (choose two):
- Uses TCP port 53
- Uses UDP port 53
- Provides FQDN information about an organization
- Is possible with Microsoft DNS servers but BIND servers
Question 15) Which of the following is true about active stack fingerprinting?
- Is based on the differential implantation of the stack and the various ways an OS responds to it
- Is based on the fact that various vendors of OS implement the TCP stack differently
- TCP connect scan
- Uses passwords crackers to escalate system privileges
- Uses sniffing techniques instead of the scanning techniques
Question 16) Which of the following protocols are susceptible to sniffing?
- Kerberos
- HTTPS
- SSL
- Telnet
Question 17) Android options to save persistent application data include which of the following? (choose all that apply)
- Internal storage
- External storage
- SQLite databases
- Networks connection
Question 18) A lack of vetting of apps can lead to which two of the following results?
- Jail-breaking
- Rooting
- Fake apps
- Malicious apps
Question 19) Which of the following companies offer cloud computing services? (choose all that apply)
- Dropbox
- Salesforce
Question 20) Which of the following characteristics applies to the Simple Service Discovery Protocol (SSDP)? (choose all that apply)
- Can be vulnerable to denial of service
- Uses multicast addresses
- Controls communication for the Universal Plug and play and play Service
- Not work behind a firewall
Question 21) What is the size of WEP initializations vector (IV)?
- 8-bit
- 16-bit
- 24-bit
- 32-bit
Question 22) Which of the following is a connect scan?
- Nmap-sU
- Nmap-sS
- Nmap-sT
- Nmap-sO
Question 23) The following is a tool that can be used to harvest credentials from a Windows machine:
- Mimikatz
- LOIC
- WannaCry
- Hping
Question 24) Meterpreter allows the attacker to move laterally by performing which of the following steps:
- Hashdump
- Getsystem
- Route add
- Load mimkatz
Question 25) Using public Internet IP addresses for a penetration test is an example of:
- External assessment
- Network-based assessment
- Internal assessment
- Host-based assessment
Question 26) The following piece of malware is a bot used as a banking Trojan:
- Dark Comet
- Zeus
- Poison lvy
- LOIC
Question 27) Which of the following are SNMP enumeration tools? (choose all that apply)
- Getif
- Softperfect
- Nmap
- Spiceworks
Question 28) Which rootkit modifies the boot sequence to load itself instead of the original virtual machine monitor?
- Boot loader-level rootkit
- Hypervisor-level rootkit
- Library-level rootkit
- Kernel-level rootkit
Question 29) What is the first step in the vulnerability management life cycle?
- Risk assessment
- Remediation
- Monitoring
- Creating a baseline
Question 30) Which of the following IDS detection techniques detects the intrusion based on the fixed behavioral characteristics?
- Signature recognition
- Anomaly detection
- Protocol anomaly detection
- All of the above
Question 31) Fake Defender deleted apk files from which two of the following locations?
- /users/Download
- /home/Download
- /mnt/external_sd/Download
- /mnt/extSdCard/Download
Question 32) According to your text, which of the following are ways to detect an intrusion with an IDS? (choose all that apply)
- Anomaly detection
- Antivirus alerts
- Signature detection
- Protocol anomaly detection
Question 33) Social engineering attack may include any of the following except:
- Getting information from Facebook
- Shoulder surfing
- Phishing
- Nessus
Question 34) The following are all password-cracking tools except:
- John the Ripper
- Cain
- Hashcat
- Hashcalc
Question 35) Which of the following sentences is true about a proxy?
- Protects the local network from outside access
- Allows attacker to view the desktop of users system
- Does not allow the connection of a number of computers to the Internet when having only one IP
- Cannot be used to filter out unwanted content
Question 36) Which of the following are methods to connect smartphones to a network? (choose all that apply)
- 3G/4G
- Bluetooth
- Wired connection
- Wi-Fi
Question 37) Which of the following are some of the main functions of an intrusion detection system (IDS)? (choose all that apply)
- Performs packet sniffing
- Blocks rule-based traffic
- Performs packet analysis
- Gathers and analyses information from a network
Question 38) Black hat hackers are:
- Individuals who work both offensively and defensively at various times
- Individuals with extraordinary computing skills, resorting to malicious or destructive activities
- Individuals professing hacker skills and using them for defensive purpose, or security analysts
- Individuals who aim to bring down critical infrastructure for a cause and are not worried about jail
Question 39) According to the text, characteristics of virtualization in cloud computing technology include which of the following? (choose all that apply)
- Isolation
- Partitioning
- Wireless capable
- Encapsulation
Question 40) Which of the following is an example of a Trojan that can be used for website defacement?
- WGET
- HTTrack
- Restorator
- CrimePack
Question 41) At which layer of the OSI model do MAC addresses operate?
- Network
- Application
- Presentation
- Physical
- Transport
- Session
- Data link
Question 42) The website netcraft.com is good for
- Passive reconnaissance that yields people’s personal information
- Active reconnaissance of a company or organization
- Passive reconnaissance of a company or organization
- Fielding old web pages no longer published
Question 43) Which of the following Windows Utilities can be used to enumerate hosts?
- Net start
- Net use
- Net view
- Net stop
Question 44) Which of the following IP spoofing detection techniques succeeds only when the attacker is in a different subnet?
- Direct TTL probes technique
- IP identification number technique
- UDP flow control method
- TCP flow control method
Question 45) WPA enhances WEP by changing temporal keys every ____.
- 1,000 packets
- 5,000 packets
- 10,000 packets
- 15,000 packets
Question 46) According to your text, examples of malware include which of the following? (choose all that apply)
- Ransomware
- Metasploit
- Botnet
- Crypter
Question 47) Which layer of the OSI model is responsible for encryption and compression?
- Presentation
- Physical
- Data link
- Session
- Transport
- Application
- Network
Question 48) An organization can implement this cloud deployment model within the corporate firewall.
- Community cloud
- Public cloud
- Private cloud
- Hybrid cloud
Question 49) Which of the following are disadvantages of signature detection? (choose all that apply)
- Signature detection
- Administrative alerts
- False alerts
- False positives
Question 50) According to the text, the three different types of virtualization include:
- SAN virtualization
- Network virtualization
- Storage virtualization
- Server virtualization
Question 51) SYN flooding takes advantage of which of the following? (choose all that apply)
- A flaw in some firewalls that do not restrict ICMP traffic by default
- A flaw in how the three-way handshake can be implemented
- Holding the incomplete connection for a period up to one second
- Not replaying to SYN/ACks
Question 52) The following is a well-known variant of ransomware:
- Zeus
- LOIC
- Dark Comet
- WannaCry
Question 53) At which layer of the OSI model do IP addresses operate?
- Network
- Physical
- Application
- Transport
- Session
- Data link
- Presentation
Question 54) Which of the following can be used as a traceroute tool?
- TTL (Time to Live)
- Nslookup
- Path Analyzer Pro
- Pingpath
Question 55) The management information base (MIB) includes which of the following? (choose all that apply)
- User accounts
- File and folder permissions
- OID numbers
- Scalar and tabular objects
Question 56) Your supervisor is concerned about the use of port 139 in your environment. What measure do you recommend talking to deal with the security risk?
- Block ICMP so the host cannot be detected
- Turn on the Windows Firewall
- Use TCP wrappers
- Disable file and print sharing
Question 57) Which of the following below accurately describes Transmission Control Protocol? (choose all that apply)
- Provides acknowledgment
- Supports retransmission of lost data
- Connection-less oriented protocol
- Can terminate a connection
Question 58) The verification phase of the vulnerability management life cycle allows for:
- Identifying critical assets
- Identifying bugs and misconfiguration
- Using intrusion detection systems and intrusion prevention systems
- Security team checks
- Reducing obvious and glaring vulnerabilities
Question 59) Identify the statement that is true for the RC6 algorithm:
- Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
- Is a 64-bit block cipher that uses a key length that can vary between 32 and 448 bits
- Is a variable key-size stream cipher with byte-oriented operations and is based on random permutation
- Includes integer multiplication and the use of four 4-bit working registers
Question 60) Which of the following is true about the 802.11 standard?
- It defines WPA-2 Enterprise and Personal
- It operates at 2.4 GHZ only
- It operates at 5 GHZ only
- It operates at both 2.4 GHZ and 5 GHZ
Question 61) The act enumerating hosts is (choose two):
- Considered active scanning
- Considered passive scanning
- A passive information gathering technique
- An active information gathering technique
Question 62) Select the three IP protocols that Snort supports for suspicious behaviour according to your text:
- ARP
- TCP
- UDP
- ICMP
Question 63) Using websites like mxtoolbox.com that provide top-level domains and subdomains is and example of:
- Passive reconnaissance
- Active reconnaissance
- DNS spoofing
- Dynamic DNS malware tracking
Question 64) According to the text, which of the following will protect by limiting the ability to access resources?
- App sandboxing
- Jail break detection
- Jail breaking
- Android rooting
Question 65) Which of the following ports are associated with NETBIOS? (choose all the apply)
- 137
- 139
- 3389
- 123
Question 66) Which of the following are LDAP enumeration tools? (choose all that apply)
- Active Directory Explorer
- LEX
- JXplorer
- SnScan
Question 67) The technique of hiding data in a picture or an audio file in another file is known as:
- Covert channel
- Steganography
- Full disk encryption
- Bitlocker
Question 68) Rainbow tables are extremely effective for cracking:
- Windows passwords
- Cisco passwords
- Linux passwords
- Salted passwords
Question 69) All of the following are true about Trivial File Transfer Protocol (TFTP), expect (choose one):
- Uses port 69
- Allows for file storage
- Is encrypted
- Is in clear text
Question 70) Android includes media support for which of the following? (choose all that apply)
- AAC
- ARM
- H.323
- H.264
Question 71) ARP spoofing involves constructing a large number of forged ARP request and reply packets to overload:
- Switch
- Router
- Bridge
- Hub
Question 72) Which of the following is an antenna based on the principle of a satellite dish and can pick up Wi-Fi signals from 10 miles away?
- Parabolic
- Yagi
- Dipole
- Omnidirectional
Question 73) Lightweight Directory Access Protocol uses which port?
- 389
- 3389
- 161
- 162
Question 74) Which version of Wired Equivalent Privacy (WEP) uses a 104-bit key size?
- 256-bit WEP
- 128-bit WEP
- 64-bit WEP
- 152-bit WEP
Question 75) What are some of the limitations of cloud computing services? (choose all that apply)
- Inflexible
- Control limits
- Contracts
- Storage limits
Question 76) The autorun feature of removable disks and CD drives can be a threat to network security. What is the best course of action to remove autorun for removable disks and CD drives in Windows?
- Use group policy
- Remove the CD-ROM drive from the system
- Provide users without administrative rights
- Tape the USB ports
Question 77) Signs of intrusions include which of the following? (choose all that apply?
- Missing logs
- Slow performance
- System crashes
- Strange processes
Question 78) When a distributed reflective denial-of-service attack (DRDoS) is used, which two of the following occurs?
- Traffic will be directed to intermediate hosts
- The source address will be spoofed
- Traffic will be directed to secondary victims
- Traffic to the secondary hosts will originate from the intermediate hosts
Question 79) How do you filter for NTP traffic in Wireshark?
- tcp.port = = 3389
- tcp.port = = 21
- udp.port = = 69
- tcp.port = = 25
- udp.port = = 123
Question 80) The following are all example of nonelectronic attacks: (choose all that apply)
- shoulder surfing
- social engineering
- dumpster diving
- manual password-cracking algorithm
Question 81) What is the last step in the vulnerability management life cycle?
- Risk assessment
- Remediation
- Monitoring
- Creating a baseline
Question 82) Enumerating the network will determine all but:
- computer names
- network shares
- website cookies
- IP address
Question 83) Which of the following is not a type of password-cracking attack?
- Hybrid
- Dictionary
- Brute force
- Replay attack
Question 84) The baselining phase of the vulnerability management life cycle allows for:
- Identifying critical assets
- Identifying bugs and misconfigurations
- Using intrusion detection systems and intrusion prevention systems
- Security team checks
- Reducing obvious and glaring vulnerabilities
Question 85) An SSID for a wireless network can be a maximum of
- 32 characters
- 64 characters
- 16 characters
- 48 characters
Question 86) Which cloud consumer model includes storage, service management, and content delivery?
- SaaS
- IaaS
- PaaS
- SAN
Question 87) Tracert counts the number of _____ to a destination IP address.
- Hops
- Lookup requests
- ICMP echo replies
- Pings
Question 88) Which of the following are tools used for footprinting? (choose all that apply)
- Maltego
- Aircrack-ng
- FOCA
- Recon-NT
Question 89) All of the statements below are characteristics of Wireshark except:
- Packet sniffer
- Protocol analyser
- Open source
- Runs on various platforms
- Offered for 48-bit and 64-bit platforms
Question 90) Which of the following techniques practiced by an attacker exploits human behavior to make attacks?
- Denial of service
- SQL injection
- Social engineering
- Buffer overflow
Question 91) The IEEE 802.16 standard is known as:
- Wi-Fi
- Ethernet
- WiMAX
- Bluetooth
Question 92) Which of these is an example of passive footprinting?
- Looking up people on zebaserach.com
- Nmap scanning
- Nmap scanning with the stealth options
- Social engineering
Question 93) A misconfiguration can include all but the following:
- Disabled security feature
- Unneeded open port
- Unpatched system
- Buffer overflow threat vector
Question 94) Looking at MAC addresses and SSIDs is an example of which of the following assessment types?
- Passive assessment
- Active assessment
- Wireless network assessment
- Application assessment
Question 95) Which of the following are characteristics of cloud computing services? (choose all that apply)
- Distributed storage
- Virtualization technology
- Resource pooling
- Measured services
Question 96) What does SSL strip do? (choose all that apply)
- Exploit the client connection
- Force HTTP
- Exploit the server
- Remove HTTPS
Question 97) Permutation scanning involves which of the following?
- Looking for new vulnerable machines
- Collecting a list of possibly vulnerable machines
- Using a pseudorandom function
- Using information from infected machines
Question 98) Which of the following scans only works if the operating system’s TCP/IP implementation is based on RFC 793?
- TCP connect scan
- NULL scan
- IDLE scan
- FTP bounce scan
- Maintaining access
Question 99) The components of IPsec include all but:
- ESP (encapsulation security payload)
- AH (authentication header)
- IKE (internet key exchange)
- TLS (transport layer security)
Question 100) The following protocols often use clear text:
- SSH, TELNET, TFTP, HTTP
- SSH, TELNET, FTP, HTTP
- SSH, FTP, TFTP, HTTP
- FTP, TELNET, TFTP, HTTP
Question 101) Which of the following are service models available to cloud consumers? (choose all that apply)
- PaaS
- SaaS
- SAN
- IaaS
Question 102) The security Account Manager (SAM) database contains:
- Users’ passwords
- Users’ passwords in Unicode
- Users’ passwords in hexadecimal (O-F)
- Hashes of users’ passwords
Question 103) The remediation phase of the vulnerability management life cycle allows for:
- Identify critical assets
- Identifying bugs and misconfigurations
- Using intrusion detection systems and intrusion prevention systems
- Security team checks
- Reducing obvious and glaring vulnerabilities
Question 104) UDP is considered (choose two):
- Reliable
- Unreliable
- Connection-oriented
- Connection-less oriented
Question 105) A computer can reach other hosts on the 10.10.10.0/24 network, but not the internet.
What is likely the technical issue?
- The wrong public IP is being used
- Type ipconfig / renew to fix
- The gateway is wrong
- ICMP is blocked
Question 106) Of the following, which two are purposes of malware?
- Obtaining passwords
- Disable networking functions
- Making a computer useless
- Remove the default LAN route
Question 107) Which two tools are well-known vulnerability scanners?
- Nessus
- Kali
- OpenVAS
- Hping
Question 108) App stores include (choose three):
- Google play
- ITunes Store
- BlackBerry App World
- Fanddago
Question 109) What type of social engineering might have the person looking in the back of a company’s facility?
- Shoulder surfing
- Person of interest watching
- Dumpster diving
- Distribution of malware via USB
Question 110) The website archive.org has
- Information about web server software and operating systems
- People’s information including addresses and phone numbers
- Old web pages
- A list of sites that been hacked recently
Question 111) According to OWASP, which of the following are secure coding techniques? (choose all that apply)
- Debugger detection
- Jail-break detection
- Certificate pinning
- checksum
Question 112) The tool hping can be used for:
- Denial of service
- Social engineering
- Phishing
- DNS lookups
Question 113) Footprinting tools will help gather the following information about a target: (choose all that apply)
- DNS records
- IP addresses
- Process lists
- Host names
Question 114) Which layer of the OSI model do port numbers get assigned?
- Presentation
- Application
- Data link
- Network
- Transport
- Session
- Physical
Question 115) Which of the following Bluetooth attacks refers to sending unsolicited messages over Bluetooth to Bluetooth-enabled?
- Bluesmacking
- Blue snarfing
- BlueSniff
- Bluejacking
Question 116) Which of the following applies to an SSID? (choose all that apply)
- Is part of the frame header
- Can be up to 32 characters
- Is case sensitive
- Will be encrypted in WEP or WPA/WPA2 is used
Question 117) Examining network devices for settings and configurations is an example of:
- External assessment
- Network-based assessment
- Internal assessment
- Host-based assessment
Question 118) The following is an attack vector due to a code vulnerability that is present:
- Buffer overflow
- Default credentials
- Physical access attack
- Phishing scam
Question 119) Which password-cracking technique will the attacker use if he/she gets some information about the password to crack?
- Rule-based attack
- Syllable attack
- Denial-of-service attack
- Distributed network attack (DNA)
Question 120) Which of the following is an antenna used in wireless base stations and provides a 360-degree horizontal radiation pattern?
- Yagi antenna
- Omnidirectional antenna
- Dipole antenna
- Parabolic grid antenna
Question 121) The following are well-known variants of ransomware:
- Zeus
- WannaCry
- NotPetya
- Trickbot
Question 122) This type of denial-of-service attack involves the use of multiple intermediary and secondary machines to contribute to the attack against the target system.
- Distributed Reflection Denial of Service (DRDoS)
- Distributed Denial of service (DDoS)
- Distributed Resource Denial of Service (DRDoS)
- Distributed Intermediary Denial of Service (DIDoS)
Question 123) Which of the following are types of database attacks? (choose all that apply)
- SQL injection
- Privilege escalation
- Data dumping
- OS command execution
Question 124) The psexec utility can be used to perform which of the following actions?
- Launch an interactive command session
- Show open files
- List processes
- Get system information
Question 125) Identify the attack which forces an unsuspecting user’s browser to send malicious requests the user did not intend?
- Cross-site request forgery (CSRF)
- SQL injection attack
- LDAP injection attack
- Cross-site scripting (XSS)
Expert Solution
1. 2
2. 1
3. 3
4. 3
5. 4
6. 1,2,3
7. 3,4
8. 2
9. 4
10. 3,4
11. 2
12. 3
13. 4
14. 1,4
15. 2
16. 4
17. 1,2,3
18. 3,4
19. 1,3,4
20. 1,2,3
21. 3
22. 3
23. 1
24. 4
25. 1
26. 2
27. 2,3
28. 1
29. 4
30. 2
31. 3,4
32. 1,3,4
33. 4
34. 4
35. 4
36. 1,2,3,4
37. 1,2,3
38. 2
39. 1,2,4
40. 3
41. 7
42. 3
43. 3
44. 1
45. 3
46. 1,3
47. 1
48. 3
49. 3,4
50. 2,3,4
51. 2,4
52. 4
53. 1
54. 3
55. 3
56. 4
57. 1,2,4
58. 3
59. 4
60. 1
61. 4
62. 2,3,4
63. 1
64. 1
65. 1,2
66. 1,3
67. 2
68. 2
69. 3
70. 1,4
71. 1
72. 1
73. 1
74. 2
75. 2,3
76. 1
77. 1,4
78. 2,3
79. 5
80. 1,3
81. 3
82. 3
83. 4
84. 1
85. 1
86. 1
87. 1
88. 1,3
89. 5
90. 3
91. 3
92. 1
93. 3
94. 3
95. 3,4
96. 2,4
97. 3
98. 2
99. 4
100. 4
101. 1,2,4
102. 1
103. 4
104. 2,4
105. 3
106. 1,3
107. 1,3
108. 1,2,3
109. 3
110. 3
111. 1,2,4
112. 1
113. 1,2,4
114. 6
115. 4
116. 2,3
117. 4
118. 1
119. 1
120. 2
121. 2
122. 2
123. 1,2,3
124. 1
125. 1
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





