Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You suspect that system administrators In one part of the target organization are turning off their systems during the times when penetration tests are scheduled, what feature could you add to the ' Rules of engagement' that could help your team test that part of the target organization?

A.

Un announced test

B.

Tell response personnel the exact lime the test will occur

C.

Test systems after normal business hours

D.

Limit tests to business hours

What is the most likely cause of the responses on lines 10 and 11 of the output below?

A.

The device at hop 10 silently drops UDP packets with a high destination port.

B.

The device at hop 10 is down and not forwarding any requests at all.

C.

The host running the tracer utility lost its network connection during the scan

D.

The devices at hops 10 and II did not return an "ICMP TTL Exceeded in Transit" message.

Which of the following modes describes a wireless interface that is configured to passively grab wireless frames from one wireless channel and pass them to the operating system?

A.

Monitor Mode

B.

Promiscuous Mode

C.

Managed Mode

D.

Master Mode

During a penetration test you discover a valid set of SSH credentials to a remote system. How can this be used to your advantage in a Nessus scan?

A.

This information can be entered under the 'Hydra' tab to launch a brute-forcepassword attack.

B.

There isn't an advantage as Nessus will ultimately discover this information.

C.

The "SSH' box can be checked to let Nessus know the remote system is running

D.

This information can be entered under the 'credentials' tab to allow Nessus to log into the system

Analyze the output of the two commands below:

Which of the following can be factually inferred from the results of these commands?

A.

The router 192.16S.U6.1 is filtering UDP traceroute.

B.

The host 10.63.104.1 is silently dropping UDP packets.

C.

The host 10.63.104.1 is not issuing ICMP packets.

D.

The router 10 63.104 206 is dropping ICMP traceroute.

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

A.

Using personal firewall software on your Laptop.

B.

Using a protocol analyzer on your Laptop to monitor for risks.

C.

Using portscanner like nmap in your network.

D.

Using an IPSec enabled VPN for remote connectivity.

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

A.

Command injection attack

B.

Cross-Site Scripting attack

C.

Cross-Site Request Forgery

D.

Code injection attack

Which of the following tasks can be performed by using netcat utility?

Each correct answer represents a complete solution. Choose all that apply.

A.

Firewall testing

B.

Creating a Backdoor

C.

Port scanning and service identification

D.

Checking file integrity

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

A.

MAC filtering the router

B.

Using WPA encryption

C.

Using WEP encryption

D.

Not broadcasting SSID

What is the sequence in which packets are sent when establishing a connection to a secured network?

A.

Auth, Associate and Probe

B.

Probe, Auth and Associate

C.

Associate, Probe and Auth

D.

Probe. Associate and Auth