Which tool can be used to silently copy files from USB devices?
Which Intrusion Detection System is best applicable for large environments where critical assets on the network need extra security and is ideal for observing sensitive network segments?
Which command line switch would be used in NMAP to perform operating system detection?
Log monitoring tools performing behavioural analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realises the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux servers to synchronise the time has stopped working?
The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly analyse the severity of the situation. Which of the following is appropriate to analyse?
Which tool would be used to collect wireless packet data?
Which of the following techniques will identify if computer files have been changed?
While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?
While performing ping scans into a target network you get a frantic call from the organisation's security team.
They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organisation's IDS monitor.
How can you modify your scan to prevent triggering this event in the IDS?
Ben, a network administrator at LargeUniversity, realised that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorised visitors but not for students. He identified this when the IDS alerted for malware activities in the network.
What should Bill do to avoid this problem?
Which of the following is a command line packet analyser similar to GUI-based Wireshark?
You perform a scan of your company's network and discover that TCP port 123 is open. What services by default run on TCP port 123?
A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?
Which system consists of a publicly available set of databases that contain domain name registration contact information?
While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:
< script>alert(" Testing Testing Testing ")
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text:
"Testing Testing Testing". Which vulnerability has been detected in the web application?
Which is the first step followed by Vulnerability Scanners for scanning a network?
If you are to determine the attack surface of an organisation, which of the following is the BEST thing to do?
Which of the following program infects the system boot sector and the executable files at the same time?
Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?
LM hash is a compromised password hashing function. Which of the following parameters describe LM Hash:?
I - The maximum pass length is 14 characters.
II - There are no distinctions between uppercase and lowercase.
III - It's a simple algorithm, so 10,000,000 hashes can be generated per second.
Which of the following are well known password-cracking programs?