Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
What is the difference between pharming and phishing attacks if an attacker in both pharming and phishing attacks may establish websites that seem similar to legitimate sites with the purpose of gathering personal information from its victims?
In a pharming attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack, an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name
Which of the following techniques should Jin use first in the situation that he who is a penetration tester, was hired to perform a black box penetration test. He decides to test their firewall?
Footprinting
Which of the following definitions best defines a covert channel?
Making use of a protocol in a way it is not intended to be used.
Which protocol, if present, would be the best evidence supporting Brandy's theory in the case that she is conducting a vulnerability scan of an enterprise network and believes that there are Windows file shares in use on the network?
SMB
What type of event took place if Vince is investigating an alert triggered by his intrusion prevention system and determines that the alert was incorrectly triggered?
False positive
What could you do to add an additional layer of security to this organization?You've been recruited as a security consultant to assess an organization's physical security practices. To enter the main work area, all personnel must pass through a locked door. A biometric fingerprint lock restricts access. A receptionist is located next to the locked door in the reception area. She logs any security events that take place using an iPad application. She also uses her iPad to complete work tasks as assigned by the organization's CEO.
Train the receptionist to keep her iPad in a locked drawer.
Which of the following is known as creating an area of the network where offending traffic is forwarded and dropped?
Black hole filtering
In a world where so much private information is stored and moved digitally, it is critical to proactively identify vulnerabilities. An ethical hacker's examination reveals weaknesses that might allow malicious attackers access. Which of the following types of evaluations does an ethical hacker perform in order to reveal these weak points?
Vulnerability assessment
To always correspond to a single machine on an internal network, enabling "server publishing", which address translation scheme allows a single public IP address?
Static Network Address Translation
Which of the following is addressed in United States Code Title 18, Chapter 47, Section 1029?
Fraud and related activity involving access devices.
Which of the following forms of Bluetooth hacking was most likely used to attack Jim's phone in the case Jim, a smartphone user, receives a bill from his provider that contains fees for calling international numbers he is sure he hasn't called?
Bluebugging
An incident investigator requests a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on an organization's network that has experienced a probable security breach. When the investigator tries to correlate the information from all of the logs, the order of many of the logged events does not line up. What is the most probable answer?
The network devices are not all synchronized.
Which of the following essential services could be blocked in the case: Following the enumeration stage, you may want to consider blocking port 389. Your colleague has recommended you use caution while blocking ports that may have an impact on your network.
LDAP
Which phases of the vulnerability management lifecycle implements patching, hardening, and vulnerability correction?
The remediation phase
Comments