What technique is Ricardo using?

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message w thin an or diary message. The technique provides 'security through obscurity'. What technique is Ricardo using?A . EncryptionB . SteganographyC . RSA algorithmD . Public-key cryptographyView...

October 8, 2021 No Comments READ MORE +

If a scanned port is open, what happens?

Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system. If a scanned port is open, what happens?A . The port will ignore the packets.B . The port will send an...

October 8, 2021 No Comments READ MORE +

What is the least important information when you analyze a public IP address in a security alert?

What is the least important information when you analyze a public IP address in a security alert?A . ARPB . Who isC . DNSD . GeolocationView AnswerAnswer: A

October 8, 2021 No Comments READ MORE +

What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?A . Service Level AgreementB ....

October 8, 2021 No Comments READ MORE +

What Nmap script will help you with this task?

When you are getting information about a webserver, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE) .PUT can upload a file to the server and DELETE can delete a file from...

October 7, 2021 No Comments READ MORE +

Which of the following will perform an Xmas scan using NMAP?

Which of the following will perform an Xmas scan using NMAP?A . nmap -sA 192.168.1.254B . nmap -sP 192.168.1.254C . nmap -sX 192.168.1.254D . nmap -sV 192.168.1.254View AnswerAnswer: C

October 7, 2021 No Comments READ MORE +

Which service in a PKI will vouch for the identity of an individual or company?

Which service in a PKI will vouch for the identity of an individual or company?A . CBCB . KDCC . CAD . CRView AnswerAnswer: C

October 7, 2021 No Comments READ MORE +

What is the most likely cause?

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the...

October 7, 2021 No Comments READ MORE +

How can rainbow tables be defeated?

How can rainbow tables be defeated?A . Password saltingB . Use of non-dictionary wordsC . All uppercase character passwordsD . Lockout accounts under brute force password cracking attemptsView AnswerAnswer: A

October 7, 2021 No Comments READ MORE +

Which of the following statements is TRUE?

Which of the following statements is TRUE?A . Sniffers operate on Layer 2 of the OSI modelB . Sniffers operate on Layer 3 of the OSI modelC . Sniffers operate on both Layer 2 & Layer 3 of the OSI model.D . Sniffers operate on the Layer 1 of the...

October 6, 2021 No Comments READ MORE +