As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?A . request smtp 25B . tcp.port eq 25C . smtp portD . tcp.contains port 25 View Answer...
Continue readingWhat is the correct process for the TCP three-way handshake connection establishment and connection termination?
What is the correct process for the TCP three-way handshake connection establishment and connection termination?A . Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACKB . Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACKC . Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACKD . Connection Establishment: SYN, SYN-ACK, ACK...
Continue readingWhat is his conclusion?
Emil uses nmap to scan two hosts using this command: nmap -sS -T 4 -O 192.168.99.1 192.168.99.7 He receives this output: What is his conclusion?A . Host 192.168.99.7isaniPad.B . He performed a SYN scan and OSs canon hosts 192.16899.1 and 192.168.99.7C . Host 192.168.99.1is the host that he launched the scan from.D . Host...
Continue readingWhat is the purpose of using-sl with Nmap?
While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap-Pn-p-sl kiosk.adobe.com www.riaa.com kiosk.adobe.com is the host with increment all PID sequence. What is the purpose of using-sl with Nmap?A . Conduct stealth scanB . Conduct ICMP scanC . Conduct IDLE scanD ....
Continue readingRisks=Threats x Vulnerabilities is referred to as the:
Risks=Threats x Vulnerabilities is referred to as the:A . BIA equationB . Disaster recovery formulaC . Risk equationD . Threat assessment View Answer Answer: C...
Continue readingWhich hacking process is Peer doing?
Peter issuing the internet looking for i format in about DX Company. Which hacking process is Peer doing?A . ScanningB . FootprintingC . EnumerationD . System Hacking View Answer Answer: B...
Continue readingWhich of the following is the least likely physical characteristic to be used in biometric control that supports a large company?
Which of the following is the least likely physical characteristic to be used in biometric control that supports a large company?A . VoiceB . FingerprintsC . Iris patternsD . Height and Weight View Answer Answer: D...
Continue readingWhich utility will tell you in real time which ports are listening or in another state?
Which utility will tell you in real time which ports are listening or in another state?A . NetsatB . LokiC . NmapD . TCP View View Answer Answer: D...
Continue readingWhat testing method did you use?
You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email and you send her an email changing the source email to her boss’s email([email protected]). In this email you ask for a pdf with information. She reads your email...
Continue readingWhich security strategy requires using several varying methods to protect IT systems against attacks?
Which security strategy requires using several varying methods to protect IT systems against attacks?A . Defense in depthB . Covert channelsC . Exponential backoff algorithmD . Three-way handshake View Answer Answer: A...
Continue reading