Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is an open source Web scanner?

A.

Nikto

B.

GFI LANguird

C.

NetRecon

D.

Internet scanner

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Strongest security level

B.

Dynamic key encryption

C.

Password hash for client authentication

D.

Public key certificate for server authentication

Which of the following nmap switches is used to perform ICMP netmask scanning?

A.

-PM

B.

-PB

C.

-PI

D.

-PS

How many bits encryption does SHA-1 use?

A.

128

B.

140

C.

512

D.

160

You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

A.

1024

B.

256

C.

512

D.

64

By default Active Directory Controllers store password representations in which file?

A.

%system roots .system 32/ntds.dit

B.

%System roots /ntds\ntds.dit

C.

%System roots /ntds\sam.dat

D.

%System roots /ntds\sam.dit

The resulting business impact, of the penetration test or ethical hacking engagement is explained in what section of the final report?

A.

Problems

B.

Findings

C.

Impact Assessment

D.

Executive Summary

You have been contracted to penetration test an e-mail server for a client that wants to know for sure if the sendmail service is vulnerable to any known attacks. You have permission to run any type of test, how will you proceed to give the client the most valid answer?

A.

Run all known sendmail exploits against the server and see if you can compromisethe service, even if it crashed the machine or service

B.

Run a banner grabbing vulnerability checker to determine the sendmail version andpatch level, then look up and report all the vulnerabilities that exist for that versionand patch level

C.

Run all sendmail exploits that will not crash the server and see if you cancompromise the service

D.

Log into the e-mail and determine the sendmail version and patch level, then lookup and report all the vulnerabilities that exist for that version and patch level

Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?

A.

One-way, the client challenges the access point

B.

One-way, the access point challenges the client

C.

No challenges occur (or wireless connection

D.

Two-way, both the client and the access point challenge each other

What is the purpose of die following command:

nc.exe -I -p 2222 -e cmd.exe

A.

It is used to start a persistent listener linked to cmd.exe on port 2222 TCP

B.

It is used to start a listener linked to cmd.exe on port 2222 TCP

C.

It is used to start a listener linked to cmd.exe on port 2222 UDP

D.

It is used to start a persistent listener linked to cmd.exe on port 2222 UDP