Which of the following tools can be used for passive OS fingerprinting?

Which of the following tools can be used for passive OS fingerprinting?A . nmapB . tcpdumpC . tracertD . pingView AnswerAnswer: B

March 8, 2025 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

March 6, 2025 No Comments READ MORE +

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...

March 4, 2025 No Comments READ MORE +

Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...

March 2, 2025 No Comments READ MORE +

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

env x=’(){ :;};echo exploit’ bash Cc ‘cat/etc/passwd’ What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?A . Removes the passwd fileB . Changes all passwords in passwdC . Add new user to the passwd fileD . Display passwd content to promptView AnswerAnswer: D

March 1, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 28, 2025 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

February 27, 2025 No Comments READ MORE +

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop...

February 26, 2025 No Comments READ MORE +

Which of the following is assured by the use of a hash?

Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D

February 26, 2025 No Comments READ MORE +

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...

February 25, 2025 No Comments READ MORE +