What command in Wireshark will help you to find this kind of traffic?

As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?A . request smtp 25B . tcp.port eq 25C . smtp portD . tcp.contains...

October 12, 2021 No Comments READ MORE +

What is the correct process for the TCP three-way handshake connection establishment and connection termination?

What is the correct process for the TCP three-way handshake connection establishment and connection termination?A . Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACKB . Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACKC . Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACKD . Connection...

October 12, 2021 No Comments READ MORE +

What is his conclusion?

Emil uses nmap to scan two hosts using this command: nmap -sS -T 4 -O 192.168.99.1 192.168.99.7 He receives this output: What is his conclusion?A . Host 192.168.99.7isaniPad.B . He performed a SYN scan and OSs canon hosts 192.16899.1 and 192.168.99.7C . Host 192.168.99.1is the host that he launched the...

October 12, 2021 No Comments READ MORE +

What is the purpose of using-sl with Nmap?

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap-Pn-p-sl kiosk.adobe.com www.riaa.com kiosk.adobe.com is the host with increment all PID sequence. What is the purpose of using-sl with Nmap?A . Conduct stealth scanB . Conduct ICMP scanC ....

October 12, 2021 No Comments READ MORE +

Risks=Threats x Vulnerabilities is referred to as the:

Risks=Threats x Vulnerabilities is referred to as the:A . BIA equationB . Disaster recovery formulaC . Risk equationD . Threat assessmentView AnswerAnswer: C

October 12, 2021 No Comments READ MORE +

Which hacking process is Peer doing?

Peter issuing the internet looking for i format in about DX Company. Which hacking process is Peer doing?A . ScanningB . FootprintingC . EnumerationD . System HackingView AnswerAnswer: B

October 11, 2021 No Comments READ MORE +

Which of the following is the least likely physical characteristic to be used in biometric control that supports a large company?

Which of the following is the least likely physical characteristic to be used in biometric control that supports a large company?A . VoiceB . FingerprintsC . Iris patternsD . Height and WeightView AnswerAnswer: D

October 11, 2021 No Comments READ MORE +

Which utility will tell you in real time which ports are listening or in another state?

Which utility will tell you in real time which ports are listening or in another state?A . NetsatB . LokiC . NmapD . TCP ViewView AnswerAnswer: D

October 11, 2021 No Comments READ MORE +

What testing method did you use?

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email and you send her an email changing the source email to her boss's email(boss@company). In this email you ask for a pdf with information....

October 11, 2021 No Comments READ MORE +

Which security strategy requires using several varying methods to protect IT systems against attacks?

Which security strategy requires using several varying methods to protect IT systems against attacks?A . Defense in depthB . Covert channelsC . Exponential backoff algorithmD . Three-way handshakeView AnswerAnswer: A

October 11, 2021 No Comments READ MORE +