What is the difference between penetration testing and vulnerability testing?

What is the difference between penetration testing and vulnerability testing? A . Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’B . Penetration testing is based on purely online vulnerability analysis while vulnerability testing...

November 1, 2020 No Comments READ MORE +

Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?

Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?A . DraftB . ReportC . Requirement listD . QuotationView AnswerAnswer: D

November 1, 2020 No Comments READ MORE +

Which of the following methods is used to perform server discovery?

Which of the following methods is used to perform server discovery?A . Banner GrabbingB . Who is LookupC . SQL InjectionD . Session HijackingView AnswerAnswer: B

October 31, 2020 No Comments READ MORE +

Where should Harold navigate on the computer to find the file?

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer.  Where should Harold navigate on the computer to find the file?A . %systemroot%LSAB . %systemroot%repairC . %systemroot%system32driversetcD . %systemroot%system32LSAView AnswerAnswer: B

October 31, 2020 No Comments READ MORE +

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?A . Server Side IncludesB . Sort Server IncludesC . Server Sort IncludesD . Slide Server IncludesView AnswerAnswer: A

October 30, 2020 No Comments READ MORE +

Which of the following will not handle routing protocols properly?

Which of the following will not handle routing protocols properly?A . “Internet-router-firewall-net architecture”B . “Internet-firewall-router-net architecture”C . “Internet-firewall -net architecture”D . “Internet-firewall/router(edge device)-net architecture”View AnswerAnswer: B

October 30, 2020 No Comments READ MORE +

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?A . AESB . DES (ECB mode)C . MD5D . RC5View AnswerAnswer: C

October 30, 2020 No Comments READ MORE +

What organization should Frank submit the log to find out if it is a new vulnerability or not?

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown...

October 30, 2020 No Comments READ MORE +

If the destination is not reachable, which one of the following are generated?

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs)...

October 30, 2020 No Comments READ MORE +

Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks. Which one of the following is a Linux based program that...

October 29, 2020 No Comments READ MORE +