Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the aforementioned SSL/TLS protocols are considered to be unsafe?

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2, and TLSv1.3

Which of the following algorithms could be used to negotiate a shared encryption key?

A.

Triple-DES

B.

SHA1

C.

Diffie-Hellman

D.

AES

Which of the following attacks are associated with an ICMP protocol?

A.

Ping of death

B.

Smurf attack

C.

ICMP flooding

D.

All of the following

In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?

A.

The public key is uploaded to the server and the private key is used by the end user for authentication.

B.

The private key is uploaded to the server and the public key is used by the end user for authentication.

Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?

A.

DNS tunneling

B.

VLAN hopping

C.

Covert channels

D.

All of the above

Which one of the following is not an online attack?

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

Which of the following is true for SNMP?

A)The default community string for read-only access is "public."

B)The default community string for read/write access is "private."

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Which command will perform a DNS zone transfer of the domain "victim.com" from the nameserver at 10.0.0.1?

A.

dig @10.0.0.1 victim.com axrfr

B.

dig @10.0.0.1 victim.com afxr

C.

dig @10.0.0.1 victim.com arfxr

D.

dig @10.0.0.1 victim.com axfr