Download PASSEMALL Prep app now
or get instant
to install app
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
Which of the following is the best countermeasure for securing the captured network traffic when using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic?
Use encryption for all sensitive traffic.
A user is unable to connect to a recently purchased Bluetooth device. An administrator uses a Linux Computer with BlueZ installed to troubleshoot the device. To see if the device answers, the administrator sends an echo request to the device's Bluetooth MAC address. Which of these commands was used?
Stan wiretapped his ex-girlfriend's telephone line to gather information about her new boyfriend. Wiretapping is an example of?
The best description of IPsec enumeration is which of the following?
Uses ESP, AH, and IKE to secure communication between VPN endpoints.
What can the hacker obtain from the file if a hacker has managed to gain access to the /etc/passwd file on a Linux host?
Usernames, but no passwords
What type of hacker is Miguel in this scenario?Miguel has been practicing his hacking abilities. He uncovered a vulnerability in a system that he was not authorized to exploit. When Miguel spotted the weakness, he notified the owner anonymously and briefed him on how to protect the system.
Randy is an ethical hacker student. He has discovered how nmap flag manipulation can aid in the discovery of open ports. Although the name of the operating system did not immediately come to mind, he may be able to figure it out by studying packet data. Randy notices a TTL of 255 and a window size of 4128 in a packet. Randy uses what kind of scanning process?
What kind of scan is being used? A ping sweep is used to look for active systems by scanning a range of IP addresses. A ping sweep can also notify a security system, which may result in an alarm being triggered or an attempt being blocked.
Which of the tools listed below should Clive use if he who is a penetration tester, is scanning the network for vulnerabilities, specifically outdated versions of Apple iOS?
What service is likely supported by the system in the case that Veronica discovered that TCP port 22 is open during a port scan of a system?
Which of the following DNS countermeasures is Julie implementing in the case:Julie creates authoritative zones for the corpnet.xyz domain on two DNS servers, one internal and one external. External clients are directed to an external server by a single DNS server. Internal clients are directed to an internal server by the other DNS server.
From standard operating security protocols, which of the following is a deviation?
A hacker uses Alternate Data Streams (ADS) for?
A characteristic of Triple DES (3DES) is which of the following?
Uses a 168-bit key