Identify the type of attack being performed by the attacker?

An attacker targeted to attack network switches of an organization to steal confidential information such as network subscriber information, passwords, etc. He started transmitting data through one switch to another by creating and sending two 802.1Q tags, one for the attacking switch and the other for victim switch. By sending...

October 3, 2019 No Comments READ MORE +

In delivering penetration testing report, which of the following steps should NOT be followed?

In delivering penetration testing report, which of the following steps should NOT be followed?A . Always send the report by email or CD-ROMB . Always deliver the report to approved stakeholders in the company in personC . Always ask for a signed acknowledgment after submitting the reportD . Report must...

October 3, 2019 No Comments READ MORE +

What could be the probable reason?

Stuart has successfully cracked the WPA-PSK password during his wireless pen testing assignment. However, he is unable to connect to the access point using this password. What could be the probable reason?A . It is a rogue access pointB . The access point implements another layer of WEP encryptionC ....

October 3, 2019 No Comments READ MORE +

You are updating the inventory worksheet for a local tree farm

SIMULATION Project 3 of 7: Tree Inventory Overview You are updating the inventory worksheet for a local tree farm. Hide rows 29 and 30.View AnswerAnswer: See explanation below.

October 2, 2019 No Comments READ MORE +

What query does Arnold need to write to retrieve the information?

Arnold is trying to gain access to a database by inserting exploited query statements with a WHERE clause. He wants to retrieve all the entries from a particular table (e. g. StudName) using the WHERE clause. What query does Arnold need to write to retrieve the information?A . EXTRACT *...

October 2, 2019 No Comments READ MORE +

What is the type of test that Ross has performed?

Ross performs security test on his company’s network assets and creates a detailed report of all the findings. In his report, he clearly explains the methodological approach that he has followed in finding the loopholes in the network. However, his report does not mention about the security gaps that can...

October 1, 2019 No Comments READ MORE +

Which of the following SQLi techniques was used to attack the database?

Veronica, a penetration tester at a top MNC company, is trying to breach the company’s database as a part of SQLi penetration testing. She began to use the SQLi techniques to test the database security level. She inserted new database commands into the SQL statement and appended a SQL Server...

September 30, 2019 No Comments READ MORE +

What would be the easiest way for Frank to circumvent this and connect to the WLAN?

Frank is performing a wireless pen testing for an organization. Using different wireless attack techniques, he successfully cracked the WPA-PSK key. He is trying to connect to the wireless network using the WPA­PSK key. However, he is unable to connect to the WLAN as the target is using MAC filtering....

September 29, 2019 No Comments READ MORE +

Which among the decoded request/response packets hold the operating system information of the remote operating system?

As a part of information gathering, you are given a website URL and asked to identify the operating system using passive OS fingerprinting. When you begin to use p0f tool and browse the website URL, the tool captures the header information of all the packets sent and received, and decodes...

September 27, 2019 No Comments READ MORE +