Which of the following problems can be solved by using Wireshark?
A hacker was able to sniff packets on a company's wireless network. The following information was discovereD.
The Key 10110010 01001011
The Cyphertext 01100101 01011010
Using the Exlcusive OR, what was the original message?
After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?
When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
What is a successful method for protecting a router from potential smurf attacks?
How is sniffing broadly categorized?
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?
A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?
Which of the following is a strong post designed to stop a car?
Advanced encryption standard is an algorithm used for which of the following?
Which of the following programming languages is most vulnerable to buffer overflow attacks?
The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?
A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?
Which of the following are variants of mandatory access control mechanisms? (Choose two.)
An NMAP scan of a server shows port 25 is open. What risk could this pose?