While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out.
What is the most likely cause behind this response?
Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS?
An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably be identified:
21 ftp
23 telnet
80 http
443 https
What does this suggest?
Which of the following Nmap commands would be used to perform a stack fingerprinting?
What is the disadvantage of an automated vulnerability assessment tool?
Name two software tools used for OS guessing? (Choose two.
Which of the following tools are used for footprinting? (Choose four)
Which of the following ICMP message types are used for destinations unreachables?
Destination unreachable administratively prohibited messages can inform the hacker to what?
Paul has just finished setting up his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router's management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop. What is Paul seeing here?
Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point.
Which of the following type of scans would be the most accurate and reliable option?
While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?
Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?
What does a type 3 code 13 represent?(Choose two.
At a Windows Server command prompt, which command could be used to list the running services?
The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
Which set of access control solutions implements two-factor authentication?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GAQM Free Exams |
---|
|