Download PASSEMALL Prep app now
or get instant
to install app
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
A TCP scan uses which of the following flags to instruct the sending system to send buffered data?
The best description of the scope of work (SOW) document is which of the following?
A detailed document that defines exactly what is going to be included in the penetration test.
To determine the next step, and then only tests relevant areas of concern, which of the following assessment types relies on each step?
What is the first step that the bank should take before enabling the audit feature in the situation that a bank stores and processes sensitive privacy information related to home loans, however, auditing has never been enabled on the system?
Determine the impact of enabling the audit feature.
On a vulnerable Linux host, what is the Shellshock bash vulnerability attempting to do?
Display passwd content to prompt
Which of the following types of software generated this report if Karen received a report of all the mobile devices on the network and this report showed the total risk score, summary of revealed vulnerabilities, and remediation suggestions?
A vulnerability scanner
Which of the following network topologies is most typically utilized on wired production networks today?
Which of the following best describes a physical barrier used to deter an aggressive intruder?
Which camera is more vandal-resistant than other cameras in the case that closed-circuit television can be used as both a preventative tool (to monitor live events) or as an investigative tool (to record events for later playback)?
A dome camera
Which of the following detection methods is Jerry using in the case that Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to the clean database?
What Metasploit module would best meet this goal in the caseWanda discovered that a system she is interested in is running Red Hat. She wants to locate user accounts on that system.
Which of the following tools would you use if you are working on firewall evasion countermeasures and are specifically looking for a tool to expose TTL vulnerabilities?
Which of the following is a technical assessment tool used to test the weakness of John the Ripper?
Which of the following scanning tools should you use in the situation that you want a list of all open UDP and TCP ports on your computer and also want to know which process opened the port, which user created the process, and what time it was created?
After the vulnerabilities are classified and the countermeasures have been deployed, what term describes the amount of risk that remains?