Paul, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network.
Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
Which protocol is used for setting up secure channels between two devices, typically in VPNs?
The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?
Sam travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?
When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is...
As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organisation's interest and your liabilities as a tester?
A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorised devices. The employee decides to write a script that will scan the network for unauthorised devices every morning at 5:00 am.
Which of the following programming languages would most likely be used?
Which protocol is used for setting up secured channels between two devices, typically in VPNs?
Which of the following tools is used to analyse the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
Which of the following programming languages is most vulnerable to buffer overflow attacks?
What is the role of test automation in security testing?
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.
What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
Which of the following types of firewalls ensures that the packets are part of the established session?
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.
Your peer, Peter Smith who works at the same department disagrees with you. He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.
What is Peter Smith talking about?
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
Under what conditions does a secondary name server request a zone transfer from a primary name server?
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Which of the following is the successor of SSL?
Which of the following open source tools would be the best choice to scan a network for potential targets?