Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which of the following is the best countermeasure for securing the captured network traffic when using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic?
Use encryption for all sensitive traffic.
A user is unable to connect to a recently purchased Bluetooth device. An administrator uses a Linux Computer with BlueZ installed to troubleshoot the device. To see if the device answers, the administrator sends an echo request to the device's Bluetooth MAC address. Which of these commands was used?
l2ping
Stan wiretapped his ex-girlfriend's telephone line to gather information about her new boyfriend. Wiretapping is an example of?
Sniffing
The best description of IPsec enumeration is which of the following?
Uses ESP, AH, and IKE to secure communication between VPN endpoints.
What can the hacker obtain from the file if a hacker has managed to gain access to the /etc/passwd file on a Linux host?
Usernames, but no passwords
What type of hacker is Miguel in this scenario?Miguel has been practicing his hacking abilities. He uncovered a vulnerability in a system that he was not authorized to exploit. When Miguel spotted the weakness, he notified the owner anonymously and briefed him on how to protect the system.
Gray hat
Randy is an ethical hacker student. He has discovered how nmap flag manipulation can aid in the discovery of open ports. Although the name of the operating system did not immediately come to mind, he may be able to figure it out by studying packet data. Randy notices a TTL of 255 and a window size of 4128 in a packet. Randy uses what kind of scanning process?
Fingerprinting
What kind of scan is being used? A ping sweep is used to look for active systems by scanning a range of IP addresses. A ping sweep can also notify a security system, which may result in an alarm being triggered or an attempt being blocked.
Network scan
Which of the tools listed below should Clive use if he who is a penetration tester, is scanning the network for vulnerabilities, specifically outdated versions of Apple iOS?
Nessus
What service is likely supported by the system in the case that Veronica discovered that TCP port 22 is open during a port scan of a system?
SSH
Which of the following DNS countermeasures is Julie implementing in the case:Julie creates authoritative zones for the corpnet.xyz domain on two DNS servers, one internal and one external. External clients are directed to an external server by a single DNS server. Internal clients are directed to an internal server by the other DNS server.
Split DNS
Which of the following is your network administrator attempting to prevent if your network administrator has set up training for all the users regarding clicking on links in emails or instant messages?
Session fixation
From standard operating security protocols, which of the following is a deviation?
Security exception
A characteristic of Triple DES (3DES) is which of the following?
Uses a 168-bit key
Comments