This phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the "landscape" looks like.
What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?
Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?
In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?
What is a NULL scan?
It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection.
Which of the following terms best matches the definition?
What is a "Collision attack" in cryptography?
Fingerprinting VPN firewalls is possible with which of the following tools?
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner's permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organisation to defend against malicious attacks or potential vulnerabilities?
What kind of Web application vulnerability likely exists in their software?
Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?
TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. Which of the following tools can be used for passive OS fingerprinting?
Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?
When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?
A newly discovered flaw in a software application would be considered which kind of security vulnerability?
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
When tuning security alerts, what is the best approach?
It is a widely used standard for message logging. It permits separation of the software that generates messages, the system that stores them, and the software that reports and analyses them.
This protocol is specifically designed for transporting event messages. Which of the following is being described?
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
Which element of Public Key Infrastructure (PKI) verifies the applicant?
A new wireless client that is 802.11 compliant cannot connect to a wireless network given that the client can see the network and it has compatible hardware and software installed. Upon further tests and investigation, it was found out that the Wireless Access Point (WAP) was not responding to the association requests being sent by the wireless client.
What MOST likely is the issue on this scenario?
Which type of scan is used on the eye to measure the layer of blood vessels?