Question Answer
Which of the following is the greatest threat posed by backups? A back up is the source of Malware or illicit information.
Which of the following is the greatest threat posed by backups? A back up is the source of Malware or illicit information.
What document describes the specifics of the testing, the associated violations, and essentiallyprotects both the organization's interest and your liabilities as a tester? Terms of Engagement
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? Nikto
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? Nikto
A hacker has successfully infected an internet-facing server which he will then use to send junk make, take part in coordinated attacks, or host junk email content. Which sort of trojan infect this server? Botnet Trojan
What document describes the specifics of the testing, the associated violations, and essentiallyprotects both the organization's interest and your liabilities as a tester? Terms of Engagement
Which of the following incident handling process phases is responsible for defining rules,collaborating human workforce, creating a back-up plan, and testing the plans for anorganization? Preparation phase
A hacker has successfully infected an internet-facing server which he will then use to send junk make, take part in coordinated attacks, or host junk email content. Which sort of trojan infect this server? Botnet Trojan
Which of the following incident handling process phases is responsible for defining rules,collaborating human workforce, creating a back-up plan, and testing the plans for anorganization? Preparation phase
You are logged in as a local admin on a Windows 7 system and you need to launch the ComputerManagement Console from command line.Which command would you use? c:compmgmt.msc
What is a "Collision attack" in cryptography? Collision attacks try to find two inputs producing the same hash.
What is a "Collision attack" in cryptography? Collision attacks try to find two inputs producing the same hash.
This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). Payment Card Industry (PCI)
This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). Payment Card Industry (PCI)
Which of the following is the successor of SSL? TLS
Which of the following is the successor of SSL? TLS
The "black box testing" methodology enforces which kind of restriction? Only the external operation of a system is accessible to the tester.
The "black box testing" methodology enforces which kind of restriction? Only the external operation of a system is accessible to the tester.
You are attempting to man-in-the-middle a session.Which protocol will allow you to guess a sequence number? TCP
You are attempting to man-in-the-middle a session.Which protocol will allow you to guess a sequence number? TCP
You are attempting to man-in-the-middle a session.Which protocol will allow you to guess a sequence number? TCP
short-range wireless communication technology intended to replace the cables connectingportable devices while maintaining high levels of security. allows devices to connect and communicate using a short- range wireless connection. Bluetooth
short-range wireless communication technology intended to replace the cables connectingportable devices while maintaining high levels of security. allows devices to connect and communicate using a short- range wireless connection. Bluetooth
To mitigate the possibility of this vulnerability being exploited, the teamwants to modify the software requirements to disallow users from entering HTML as input intotheir Web application. Cross-site scripting
To mitigate the possibility of this vulnerability being exploited, the teamwants to modify the software requirements to disallow users from entering HTML as input intotheir Web application. Cross-site scripting
To mitigate the possibility of this vulnerability being exploited, the teamwants to modify the software requirements to disallow users from entering HTML as input intotheir Web application. Cross-site scripting
What does a firewall check to prevent particular ports and applications from getting packets intoan organization? Transport layer port numbers and application layer headers
Which Linux based tool has the ability to change any user's password or activate disabled Widows accounts? CHNTPW
is a software utility for resetting or blanking local passwords used by Windows NT, 2000, XP, Vista, 7, 8 and 8.1. It does this by editing the SAM database where Windows stores password hashes. CHNPW
What term describes the amount of risk that remains after the vulnerabilities are classified and thecountermeasures have been deployed? Residual risk
investigator receive a copy of the logs from all firewalls, proxy servers,and IDS on the network of an organization that has experienced a possible breach . the investigator attempts to correlate the information in the logs, the sequence do not match up. The network devices are not all synchronized.
You have successfully compromised a machine on the network and found a server that is alive onthe same network. You tried to ping it but you didn't get any response back.What is happening? ICMP could be disabled on the target server.
CEH

Leave a Reply

Your email address will not be published. Required fields are marked *