Which of the following lists are valid data-gathering activities associated with a risk assessment?
While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?
Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?
Which command line switch would be used in NMAP to perform operating system detection?
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following is an application that requires a host application for replication?
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
Smart cards use which protocol to transfer the certificate in a secure manner?
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity?
What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected?
You receive an e-mail with the following text message.
"Microsoft and HP today warned all customers that a new, highly dangerous virus has been discovered which will erase all your files at midnight. If there's a file called hidserv.exe on your computer, you have been infected and your computer is now running a hidden server that allows hackers to access your computer. Delete the file immediately. Please also pass this message to all your friends and colleagues as soon as possible."
You launch your antivirus software and scan the suspicious looking file hidserv.exe located in c:\windows directory and the AV comes out clean meaning the file is not infected. You view the file signature and confirm that it is a legitimate Windows system file "Human Interface Device Service".
What category of virus is this?
Which of the following tool would be considered as Signature Integrity Verifier (SIV)?
PDF + Testing Engine |
---|
$66 |
Testing Engine |
---|
$50 |
PDF (Q&A) |
---|
$42 |
GAQM Free Exams |
---|
|