question
stringlengths 123
1.01k
| answer
stringclasses 5
values |
---|---|
Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP
header and the related TCP window size and obtained the following results:
TTL: 64 Window Size: 5840
What is the OS running on the target machine?
A. Solaris OS
B. Windows OS
C. Mac OS
D. Linux OS
| D |
Which protocol is used for setting up secure channels between two devices, typically in VPNs?
A. PEM
B. ppp
C. IPSEC
D. SET
| C |
Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely.
Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility,
he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send
and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints.
What is the technique followed by Peter to send files securely through a remote connection?
A. DMZ
B. SMB signing
C. VPN
D. Switch network
| C |
Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the
following input?
<!DOCTYPE blah [ < IENTITY trustme SYSTEM "file:///etc/passwd" > ] >
A. XXE
B. SQLi
C. IDOR
D. XXS
| A |
While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to
determine whether the firewall is stateful or stateless, which of the following options would be best to use?
A. -sA
B. -sX
C. -sT
D. -sF
| A |
What type of virus is most likely to remain undetected by antivirus software?
A. Cavity virus
B. Stealth virus
C. File-extension virus
D. Macro virus
| B |
Which of the following types of SQL injection attacks extends the results returned by the original query,
enabling attackers to run two or more statements if they have the same structure as the original one?
A. Error-based injection
B. Boolean-based blind SQL injection
C. Blind SQL injection
D. Union SQL injection
| D |
To hide the file on a Linux system, you have to start the filename with a specific character. What is the
character?
A. Exclamation mark (!)
B. Underscore (_)
C. Tilde H
D. Period (.)
| D |
Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to
accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail. What do you want to
??know?? to prove yourself that it was Bob who had send a mail?
A. Non-Repudiation
B. Integrity
C. Authentication
D. Confidentiality
| A |
You want to analyze packets on your wireless network. Which program would you use?
A. Wireshark with Airpcap
B. Airsnort with Airpcap
C. Wireshark with Winpcap
D. Ethereal with Winpcap
| A |
Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client
organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached
record, he determines the sites recently visited by the organization's user. What is the enumeration technique
used by Henry on the organization?
A. DNS zone walking
B. DNS cache snooping
C. DNS SEC zone walking
D. DNS cache poisoning
| B |
Insecure direct object reference is a type of vulnerability where the application does not verify if the user is
authorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to
the account of a benign user Ned.
Which of the following requests best illustrates an attempt to exploit an insecure direct object reference
vulnerability?
A. ?GET /restricted/goldtransfer?to=Rob&from=1 or 1=1? HTTP/1.1Host: westbank.com?
B. ?GET /restricted/\r\n\%00account%00Ned%00access HTTP/1.1 Host: westbank.com?
C. ?GET /restricted/accounts/?name=Ned HTTP/1.1 Host westbank.com?
D. ?GET /restricted/ HTTP/1.1 Host: westbank.com
| C |
An organization has automated the operation of critical infrastructure from a remote location. For this purpose,
all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure
the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to
install an OT security tool that further protects against security incidents such as cyber espionage, zero-day
attacks, and malware. Which of the following tools must the organization employ to protect its critical
infrastructure?
A. Robotium
B. BalenaCloud
C. Flowmon
D. IntentFuzzer
| C |
Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an
attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her
social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link
and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to
create the spoofed email?
A. PyLoris
B. Slowloris
C. Evilginx
D. PLCinject
| C |
You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to
prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether
someone is performing an ARP spoofing attack on your laptop?
A. You should check your ARP table and see if there is one IP address with two different MAC addresses.
B. You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.
C. You should use netstat to check for any suspicious connections with another IP address within the LAN.
D. You cannot identify such an attack and must use a VPN to protect your traffic, r
| A |
To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first
collects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the
machines. The list Is divided by assigning half of the list to the newly compromised machines. The scanning
process runs simultaneously. This technique ensures the spreading and installation of malicious code in little
time.
Which technique is discussed here?
A. Hit-list-scanning technique
B. Topological scanning technique
C. Subnet scanning technique
D. Permutation scanning technique
| A |
Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script.
After infecting the victim's device. Mason further used Emotet to spread the infection across local networks
and beyond to compromise as many machines as possible. In this process, he used a tool, which is a
self-extracting RAR file, to retrieve information related to network resources such as writable share drives.
What is the tool employed by Mason in the above scenario?
A. NetPass.exe
B. Outlook scraper
C. WebBrowserPassView
D. Credential enumerator
| D |
Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration
on an organization's network. In the process of enumeration, James discovered a service that is accessible to
external sources. This service runs directly on port 21. What is the service enumerated byjames in the above
scenario?
A. Border Gateway Protocol (BGP)
B. File Transfer Protocol (FTP)
C. Network File System (NFS)
D. Remote procedure call (RPC)
| B |
An unauthorized individual enters a building following an employee through the employee entrance after the
lunch rush. What type of breach has the individual just performed?
A. Reverse Social Engineering
B. Tailgating
C. Piggybacking
D. Announced
| B |
By performing a penetration test, you gained access under a user account. During the test, you established a
connection with your own machine via the SMB service and occasionally entered your login and password in
plaintext.
Which file do you have to clean to clear the password?
A. .X session-log
B. .bashrc
C. .profile
D. .bash_history
| D |
Websites and web portals that provide web services commonly use the Simple Object Access Protocol
(SOAP).
Which of the following is an incorrect definition or characteristics of the protocol?
A. Exchanges data between web services
B. Only compatible with the application protocol HTTP
C. Provides a structured model for messaging
D. Based on XML
| B |
Attacker Simon targeted the communication network of an organization and disabled the security controls of
NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and
RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active
processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by
Simon?
A. Internal monologue attack
B. Combinator attack
C. Rainbow table attack
D. Dictionary attack
| A |
Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without
the recipient?s consent, similar to email spamming?
A. Bluesmacking
B. BlueSniffing
C. Bluejacking
D. Bluesnarfing
| C |
A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much
information can be obtained from the firm?s public facing web servers. The engineer decides to start by using
netcat to port 80.
The engineer receives this output:
HTTP/1.1 200 OK
Server: Microsoft-IIS/6
Expires: Tue, 17 Jan 2011 01:41:33 GMT
Date: Mon, 16 Jan 2011 01:41:33 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last Modified: Wed, 28 Dec 2010 15:32:21 GMT
ETag:?b0aac0542e25c31:89d?
Content-Length: 7369
Which of the following is an example of what the engineer performed?
A. Banner grabbing
B. SQL injection
C. Whois database query
D. Cross-site scripting
| A |
Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows
systems?
A. getsystem
B. getuid
C. keylogrecorder
D. autoroute
| A |
What type of a vulnerability/attack is it when the malicious person forces the user?s browser to send an
authenticated request to a server?
A. Session hijacking
B. Server side request forgery
C. Cross-site request forgery
D. Cross-site scripting
| C |
Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a
signature-based IDS?
A. Produces less false positives
B. Can identify unknown attacks
C. Requires vendor updates for a new threat
D. Cannot deal with encrypted network traffic
| B |
Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which
information security standard is most applicable to his role?
A. FISMA
B. HITECH
C. PCI-DSS
D. Sarbanes-OxleyAct
| C |
When conducting a penetration test, it is crucial to use all means to get all available information about the
target network. One of the ways to do that is by sniffing the network. Which of the following cannot be
performed by the passive network sniffing?
A. Identifying operating systems, services, protocols and devices
B. Modifying and replaying captured network traffic
C. Collecting unencrypted information about usernames and passwords
D. Capturing a network traffic for further analysis
| B |
Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used
a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a
honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect
honeypots?
A. Detecting honeypots running on VMware
B. Detecting the presence of Honeyd honeypots
C. Detecting the presence of Snort_inline honeypots
D. Detecting the presence of Sebek-based honeypots
| C |
Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is
using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this
vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's
output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious
app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?
A. Man-in-the-disk attack
B. aLTEr attack
C. SIM card attack
D. Spearphone attack
| D |
Cross-site request forgery involves:
A. A request sent by a malicious user from a browser to a server
B. Modification of a request by a proxy between client and server
C. A browser making a request to a server without the user?s knowledge
D. A server making a request to another server without the user?s knowledge
| C |
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet
switch?
A. Evil twin attack
B. DNS cache flooding
C. MAC flooding
D. DDoS attack
| C |
How can rainbow tables be defeated?
A. Use of non-dictionary words
B. All uppercase character passwords
C. Password salting
D. Lockout accounts under brute force password cracking attempts
| C |
Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used
a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP
address. By performing this, Miley received messages directed to the victim's MAC address and further used
the tool to intercept, steal, modify, and block sensitive communication to the target system. What is the tool
employed by Miley to perform the above attack?
A. Gobbler
B. KDerpNSpoof
C. BetterCAP
D. Wireshark
| C |
The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the
network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124. An attacker is
trying to find those servers but he cannot see them in his scanning. The command he is using is: nmap
192.168.1.64/28.
Why he cannot see the servers?
A. He needs to add the command ??ip address?? just before the IP address
B. He needs to change the address to 192.168.1.0 with the same mask
C. He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range
D. The network must be dawn and the nmap command and IP address are ok
| C |
Ben purchased a new smartphone and received some updates on it through the OTA method. He received two
messages: one with a PIN from the network operator and another asking him to enter the PIN received from
the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner. What
is the type of attack performed on Ben in the above scenario?
A. Advanced SMS phishing
B. Bypass SSL pinning
C. Phishing
D. Tap 'n ghost attack
| A |
Attempting an injection attack on a web server based on responses to True/False QUESTION NO:s is called
which of the following?
A. Compound SQLi
B. Blind SQLi
C. Classic SQLi
D. DMS-specific SQLi
| B |
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible Intrusion Detection System. What is the best approach?
A. Use Alternate Data Streams to hide the outgoing packets from this server.
B. Use HTTP so that all traffic can be routed vis a browser, thus evading the internal Intrusion Detection Systems.
C. Install Cryptcat and encrypt outgoing packets from this server.
D. Install and use Telnet to encrypt all outgoing traffic from this server.
| C |
John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this
process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using
this technique. John successfully injected malware to bypass a firewall and maintained communication with
the victim machine and C&C server. What is the technique employed by John to bypass the firewall?
A. DNS cache snooping
B. DNSSEC zone walking
C. DNS tunneling method
D. DNS enumeration
| C |
Which iOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after
each successive reboot?
A. Tethered jailbreaking
B. Semi-tethered jailbreaking
C. Untethered jailbreaking
D. Semi-Untethered jailbreaking
| C |
You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
A. hping2 host.domain.com
B. hping2 --set-ICMP host.domain.com
C. hping2 -i host.domain.com
D. hping2 -1 host.domain.com
| D |
You have been authorized to perform a penetration test against a website. You want to use Google dorks to
footprint the site but only want results that show file extensions. What Google dork operator would you use?
A. filetype
B. ext
C. inurl
D. site
| A |
Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and
out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect
against SQL injection attacks?
A. Data-driven firewall
B. Packet firewall
C. Web application firewall
D. Stateful firewall
| C |
Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication
and integrity of messages being transmitted in the corporate network. To encrypt the messages, she
implemented a security model in which every user in the network maintains a ring of public keys. In this
model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the
message using their private key. What is the security model implemented by Jane to secure corporate
messages?
A. Zero trust network
B. Transport Layer Security (TLS)
C. Secure Socket Layer (SSL)
D. Web of trust (WOT)
| D |
A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the
web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple
connections and keeps waiting for the requests to complete.
Which attack is being described here?
A. Desynchronization
B. Slowloris attack
C. Session splicing
D. Phlashing
| B |
A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the
Equifax data breach that affected 143 million customers. A fix was available from the software vendor for
several months prior 10 the Intrusion. This Is likely a failure in which of the following security processes?
A. vendor risk management
B. Security awareness training
C. Secure deployment lifecycle
D. Patch management
| D |
Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then
used to launch which types of attack?
A. MITM attack
B. Birthday attack
C. DDoS attack
D. Password attack
| C |
Thomas, a cloud security professional, is performing security assessment on cloud services to identify any
loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious
backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is
reallocated to new clients or businesses that use it as an laaS.
What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above
scenario?
A. Man-in-the-cloud (MITC) attack
B. Cloud cryptojacking
C. Cloudborne attack
D. Metadata spoofing attack
| C |
Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software
program, which involves 32 rounds of computational operations that include substitution and permutation
operations on four 32-bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the
following algorithms includes all the above features and can be integrated by Tony into the software program?
A. TEA
B. CAST-128
C. RC5
D. serpent
| D |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.