Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which tool can be used to perform session splicing attacks if session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small-sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures?
Whisker
To use DoS and DDoS attacks, which of the following motivates attackers?
Hacktivism, profit, and damage reputation
When a program is being installed without the constant supervision of the IT employee and fails to clean up after, which of the following privilege escalation risks occurs?
Unattended installation
The best description of an anti-virus sensor system is which of the following?
A collection of software that detects and analyzes malware.
The four basic systems of IoT technology are which of the following?
Devices, gateway, data storage, and remote control
Which of the following cloud concepts does this represent in the situation A company has subscribed for a cloud service that provides cloud apps and storage space. The number of staff at the company immediately doubled as a result of acquisition. The cloud service provider was able to add cloud services for these new employees without the need for hardware adjustments.
Rapid elasticity
GINA means which of the following?
Graphical Identification and Authentication DLL
To scan a web server to find ports that the web server is using for various services, which of the following footprinting methods would you use?
Service discovery
Which of the following would be the best type of firewall for her to use in the case that Jessica needs to set up a firewall to protect her internal network from the Internet?
Hardware
Which type of penetration test are you performing if you are executing an attack in order to simulate an outside attack?
Black box
Which of the following actions should Dan take if he wants to implement reconnaissance countermeasures to help protect his DNS service?
Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.
Which of the following techniques is described in the following scenario?Louis, a professional hacker, had encrypted all of his browsing activity and traveled anonymously to collect sensitive/hidden information about official government or federal databases. He successfully carried out an attack on the target government organization after acquiring the information without being detected.
VPN footprinting
The best description of the SQL Power Injector tool is which of the following?
A tool used to find SQL injections on a web page.
The functions do a single quote (') perform in an SQL injection are which of the following?
Indicates that data has ended and a command is beginning.
Comments