Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which of the following should Heidi do in the case she runs into an ethical situation she's never faced before and is unsure how to proceed during a penetration test?
Reach out to an attorney for legal advice.
To ensure an organization is following federal laws and regulations, which type of penetration test is required?
Compliance-based
Which Trojan horse packet components install malicious code on the target machine?
Dropper
To modify flags and adjust other packet content, which packet crafting software programs can be used?
Colasoft
The encrypted form of a message that is unreadable except to its intended recipient is which of the following?
ciphertext
Which of the following types of attacks did Sam use in the case:He used malware to get access to Sally's PC on the network. He has discovered information that would enable him to leverage the underlying NTLM to raise his privileges without the requirement for the plaintext password.
Pass the hash
For Windows2000 SAM, what is the algorithm used by LM?
DES
Which of the following Nmap commands helped Jim retrieve the required information? Jim, a professional hacker, attacked a company that manages crucial industrial infrastructure. Jim used Nmap to scan open ports and services operating on servers linked to the organization's OT network. He utilized the Nmap command to locate Ethernet/IP devices connected to the Internet and obtained further information such as the vendor name, product code and name, device name, and IP address.
nmap -Pn -sU -p 44818 --script enip-info < Target IP >
Which of the following is the proper nmap command in the case:Nmap can be used for banner grabbing. Nmap connects to an open TCP port and returns anything sent in a five-second period.
nmap -sV --script=banner ip_address
Which federal regulation does Michael need to make sure he follows if Michael is performing a penetration test for a hospital?
HIPAA
The gathering of potentially actionable, overt, and publicly available information is which of the following?
Open-source intelligence
Which of the following is the best command to filter a specific source IP address if using Wireshark filtering, you want to see all traffic except IP address 192.168.142.3.?
ip.src ne 192.168.142.3
Which of the following issues causes SQL injections?
Web applications
Comments