Question 1

(Choose all that apply.) To quickly identify live targets on a subnet, which of the following commands would you use?

Question 2

Which of the following is not true regarding RC4 if RC4 is a simple, fast encryption cipher?

Question 3

Choose the answer choice that best indicates the characteristics of a Boot Sector Virus?

Question 4

Which of the following layers is needed for operating the proxy of the OSI model?

Question 5

Which defines the security standards for every company that handles cardholder data for any type of payment card?

Question 6

In the web world, which is an extremely common IDS evasion technique?

Question 7

Which metric offers the best understanding of a system’s performance when evaluating a biometric authentication system?

Question 8

Which of the following is the key difference between these methodologies in the case: When executing a penetration test, a typical technique is the penetration testing life cycle. This approach is nearly equivalent to the ethical hacking approach.

Question 9

Which of the following types of attacks did Sam use in the case: He used malware to get access to Sally's PC on the network. He has discovered information that would enable him to leverage the underlying NTLM to raise his privileges without the requirement for the plaintext password.

Question 10

Which of the following cloud computing attacks is he using if an attacker's intent is to find out and then use sensitive data like passwords, session cookies, and other security configurations such as UDDI, SOAP, and WSDL?

Question 11

The best description of a DoS attack is which of the following?

Question 12

Which of the following scoring systems could you use in the case that you as an ethical hacker are looking for a way to organize and prioritize vulnerabilities that were discovered in your work?

Question 13

For protecting a system from a DoS attack, which of the following best describes a reverse proxy method?

Question 14

The type of Bluetooth hacking that is a denial-of-service attack is which of the following?

Question 15

Which of the following is a password cracking tool that can connect to over 50 different targets at the same time?

Question 16

To silently copy files from USB devices, which tool can be used?

Question 17

Which of the following policies would address what you should do if your data was breached?

Question 18

The attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users, identify the web application attack.

Question 19

ZeroAccess and has virus, Trojan horse, and rootkit components are known as which of the following?

Question 20

A private IP address is NOT one of the following?

Question 1

(Choose all that apply.) To quickly identify live targets on a subnet, which of the following commands would you use?

1 / 20

  • Course Set 1