Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which social engineering technique includes compliments, misinformation, feigning ignorance, and being a good listener?
Elictitation
To run as aggressively as possible, what nmap command line option causes nmap?
-T5
What is the major risk associated with this configuration in the case that Taylor is probing a DNS server and discovers that it is configured as an open resolver?
The server may be used in an amplification attack.
Name of the open-source forensics application that can be used to extract information from social media posts and discover relationships between companies, people, email addresses, and other data is which of the following?
Maltego
For the identity of an individual or company, which service in a PKI will vouch?
CA
The best description of a honeypot is which of the following?
A honeypot's purpose is to look like a legitimate network resource.
The encryption tools would prevent a user from reading a file that they did not generate and does not demand you to encrypt a whole drive is which of the following?
EFS
Which of the following employs on-the-fly encryption, which means that data is automatically encrypted before it is saved and decrypted once it is loaded?
VeraCrypt
Which of the following referred to an attack that targets senior executives and high-profile victims?
Whaling
Which of the following nmap commands would you enter to do a ping sweep in the case you have found the IP address of a host to be 172.125.68.30 and you want to see what other hosts are available on the network?
nmap -sn [email protected]@1-255
Which of the following terms represents the process of sniffing traffic between a user and a server, then redirecting the traffic to the attacker's machine, where malicious traffic can be forwarded to either the user or the server?
Man-in-the-middle
What command could help Tina locate this module in the case that she want to find a Metasploit exploit that works with a software package she is targeting?
searchsploit
You receive a phone call from one of your top clients. The consumer is inquiring about the personnel, teams, and management at your organization. What do you think you should do?
You should not provide any information and forward the call to the help desk.
This TCP flag instructs the sending system to quickly transfer all buffered data.
PSH
Comments