Which of the following techniques is used to monitor telephonic and Internet conversations by a third party?
What does TCSEC stand for?
In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?
Which of the following tools is used for SNMP enumeration?
Which of the following tasks is NOT performed into the enumeration phase?
Which of the following tools is based on the SATAN tool?
Which of the following statements about Fport is true?
Which of the following nmap switches is used to perform ICMP netmask scanning?
You have been contracted to perform a black box pen test against the Internet facing servers for a company. They want to know, with a high level of confidence, if their servers are vulnerable to external attacks. Your contract states that you can use all tools available to you to pen test the systems. What course of action would you use to generate a report with the lowest false positive rate?
Which of the following best explains why you would warn to clear browser slate (history. cache, and cookies) between examinations of web servers when you've been trapping and altering values with a non-transparent proxy?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |