Download PASSEMALL Prep app now
or get instant
to install app
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
What zone is normally used for systems that must have limited public access when designing a firewalled network?
Which of the following methods is the attacker attempting to use if an attacker is attempting to access a database using a web application system account instead of user-provided credentials?
Hijacking web credentials
Which command will allow Daphne to do in this situation?Daphne believes a Trojan horse has infected her system. She wants to examine all active network connections to see which programs are connected and the FQDN to which those programs are connected.
netstat -a -b
Which of the following is the best solution for securing Joe's workstation if Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk and he doesn't want to sign out of his computer each time he leaves?
Configure the screen saver to require a password.
The action was carried out with the help of the WinDump command line sniffer is which of the following?
Wrote packet capture files from interface 1 into mycap.pcap.
What is your best assessment regarding ARP poisoning after examining the results in the following case:As the cybersecurity specialist for your organization, you suspect a hacker is accessing your network via ARP poisoning. You used Wireshark to collect packets and then filtered the results to test your hypothesis.
ARP poisoning is occurring, as indicated by the duplicate response IP address.
During a firewall rule base analysis, Walt would be likely to discover which of the following rules on his organization’s firewall ?
Allow inbound access to an email server
What type of threat has Angela caused the company if accidentally left her backpack with a company laptop at the coffee shop on her way to work?
In biometric control that supports a large company, which of the following is the least-likely physical characteristic to be used?
Height and Weight
Which of the following describes what Jason has done in the case that Jason, an attacker, has manipulated a customer's connection to disconnect the real customer and allow the server to think that he is the authenticated user?
A hacker named Jorge has acquired access to a Linux system. He's found the usernames and IDs. He needs the hashed passwords for the users he discovered. In which file should he look?
What key should Bob use to decrypt the message in the case that Alice sent an encrypted message to Bob using public key cryptography?
Bob’s private key
What influence principle was in use if Joe is studying a recent social engineering attack that occurred against his organization and the attacker phoned an administrative assistant and said that her files were being deleted and that he needed the assistant’s password to stop the loss of data?
What document describes the specifics of the testing, the associated violations, and protects both the organization's interests and your liabilities as a tester in the case that a private firm employed you as a Certified Ethical Hacker to conduct an external security assessment using penetration testing?
Rules of Engagement