9
9
9
Question Results
Question: Score 1 of 1
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
Response:
Question: Score 0 of 1
Which of the following nmap options can be used for very fast scanning?
Response:
-T5
-T0
-O
-T4
Question: Score 1 of 1
To compromise or to hack a system or network, the hackers go through various phases. What is the first hacking phase that hackers perform to
gather information about a target before launching an attack?
Response:
Maintaining Access
Reconnaissance
Gaining Access
Scanning
Clearing Track
Question: Score 0 of 1
Which of the following SQL injection attack does an attacker usually bypassing user authentication and extract data by using a conditional OR
clause so that the condition of the WHERE clause will always be true?
Response:
Tautology
Error-Based SQLi
UNION SQLi
End-of-Line Comment
Question: Score 1 of 1
You need to send an email containing confidential information. Your colleague advises you to use PGP to be sure that the data will be safe. What
should you use to communicate correctly using this type of encryption?
Response:
Question: Score 1 of 1
What type of database uses multiple tables linked together in complex relationships?
Response:
Hierarchical
Relational
Distributed
Flat
Question: Score 0 of 1
A(n) _____ attack begins with interception and monitoring of network traffic that is being sent between two cloud nodes. The attacker uses packet
sniffers to capture sensitive data such as passwords, session cookies, and other web service–related security configurations, such as UDDI
(Universal Description Discovery and Integrity), SOAP (Simple Object Access Protocol), and WSDL (Web Service Description Language) files.
Response:
command injection
XML Injection
service hijacking
XAML injection
Question: Score 1 of 1
Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture-capital firm. He used an information-gathering tool to collect
information about the loT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical
reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the Internet, further allowing him
to exploit these devices in the network.
Which of the following tools was employed by Lewis in the above scenario?
Response:
NeuVector
Censys
Lacework
Wapiti
Question: Score 1 of 1
Identify the security model by description: In this security model, every user in the network maintains a ring of public keys. Also, a user needs to
encrypt a message using the receiver’s public key, and only the receiver can decrypt the message using their private key.
Response:
Web of trust
Question: Score 0 of 1
A friend of yours tells you that he downloaded and executed a file that was sent to him by a coworker. Since the file did nothing when executed, he
asks you for help because he suspects that he may have installed a trojan on his computer.
What tests would you perform to determine whether his computer is infected?
Response:
You do not check; rather, you immediately restore a previous snapshot of the operating system
Use netstat and check for outgoing connections to strange IP addresses or domains
Upload the file to VirusTotal
Question: Score 1 of 1
Response:
Linear cryptanalysis
Differential cryptanalysis
Birthday attack
Question: Score 1 of 1
George is implementing a WAP with 8 MIMO antennas. What was the first standard to use 8 MIMO?
Response:
IEEE 802.11-2012
802.11n
802.11n 2009
IEEE 802.11ac
Question: Score 0 of 1
You need to increase the security of keys used for encryption and authentication. For these purposes, you decide to use a technique to enter an
initial key to an algorithm that generates an enhanced key resistant to brute-force attacks. Which of the following techniques will you use?
Response:
Key reinstallation
Key stretching
KDF
PKI
Question: Score 1 of 1
Ivan, an evil hacker, is preparing to attack the network of a financial company. To do this, he wants to collect information about the operating
systems used on the company's computers. Which of the following techniques will Ivan use to achieve the desired result?
Response:
UDP Scanning.
IDLE/IPID Scanning.
SSDP Scanning.
Banner Grabbing.
Question: Score 0 of 1
Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the
organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain
insight into attacker methodologies.
He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process,
he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks.
What is the type of threat intelligence collected by Arnold in the above scenario?
Response:
Question: Score 1 of 1
Ivan, a black hat hacker, tries to call numerous random numbers inside the company, claiming he is from the technical support service. It offers
company employee services in exchange for confidential data or login credentials. What method of social engineering does Ivan use?
Response:
Elicitation
Tailgating
Jerome is performing a scan on a target server. He is sending a SYN scan. If the port is open, what will Jerome receive back?
Response:
SYN-ACK
Nothing
RST
ACK
Question: Score 1 of 1
Identify the attack used in the scenario below: The victim connected his iPhone to a public computer that the attacker had previously infected. After
establishing the connection with this computer, the victim enabled iTunes Wi-Fi sync so that the device could continue communication with that
computer even after being physically disconnected.
Now the attacker who infected the computer can access the victim's iPhone and monitor all of the victim's activity on the iPhone, even after the
device is out of the communication zone.
Response:
Man-in-the-disk attack
iOS trustjacking
iOS jailbreaking
Question: Score 1 of 1
Alex, the penetration tester, performs a server scan. To do this, he uses the method where the TCP Header is split into many packets so that it
becomes difficult to determine what packages are used for. Determine the scanning technique that Alex uses?
Response:
TCP Scanning
IP Fragmentation Scan
Question: Score 1 of 1
You have detected an abnormally large amount of traffic coming from local computers at night. You decide to find out the reason, do a few checks
and find that an attacker has exfiltrated user data. Also, you noticed that AV tools could not find any malicious software, and the IDS/IPS has not
reported on any non-whitelisted programs.
Which of the following type of malware did the attacker use to bypass your company’s application whitelisting?
Response:
Fileless malware
Zero-day malware
Phishing malware
Question: Score 1 of 1
You want to make your life easier and automate the process of updating applications. You decide to use a user-defined HTTP callback or push APIs
that are raised based on trigger events. When this feature invokes, data is supplied to other applications so that users can instantly receive real-time
information. What is the name of this technique?
Response:
Webhooks
REST API
SOAP API
Web shells
Question: Score 1 of 1
Response:
Hydra
Airmon-ng
NMAP
Question: Score 1 of 1
Rajesh, the system administrator analyzed the IDS logs and noticed that when accessing the external router from the administrator's computer to
update the router configuration, IDS registered alerts. What type of an alert is this?
Response:
True positve
True negative
False positive
False negative
Question: Score 1 of 1
Identify technique for securing the cloud resources according to describe below: This technique assumes by default that a user attempting to
access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. When using this
technique imposed conditions such that employees can access only the resources required for their role.
Response:
Serverless computing
Container technology
DMZ
Question: Score 0 of 1
Maintaining Access: Which of the following tools can provide the attacker with a remote shell AND allow for file transfers to and from the
compromised machine?
(Select all that apply)
Response:
Stuxnet
Tini
metasploit
netcat
Question: Score 1 of 1
The SOC analyst of the company wants to track the transfer of files over the unencrypted FTP protocol, which filter for the Wireshark sniffer should
he use?
Response:
tcp.port == 443
tcp.port == 80
tcp.port ==21
tcp.port = 23
Question: Score 1 of 1
As usual, you want to open your online banking from your home computer. You enter the URL www.yourbanksite.com into your browser. The
website is displayed and prompts you to re-enter your credentials as if you have never visited the site before.
You decide to check the URL of the website and notice that the site is not secure and the web address appears different. Which of the following
types of attacks have you been exposed to?
Response:
DoS attack
DNS hijacking
DHCP spoofing
Question: Score 1 of 1
Response:
Subnetting
Spyware
Port knocking
Unicode characters
Question: Score 1 of 1
Response:
TCP
SSH
ICMP
UDP
Question: Score 1 of 1
Ivan, the black hat hacker, plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that
he could make it a root bridge that will later allow him to sniff all the traffic in the target's network. What attack did Ivan perform?
Response:
ARP spoofing.
VLAN hopping.
DNS poisoning.
STP attack.
Question: Score 1 of 1
Joh has placed a suspicious file on a non-networked isolated machine and will use a range of tools to test what processes it spawns, what
resources it uses, what registry settings it affects, and other activity. What best describes this process?
Response:
Air gap
Static analysis
Sheep dip
Dynamic analysis
Question: Score 1 of 1
What is the name of the risk assessment method that allows you to study how various types of negative events (violations, failures or destructions)
can affect the main activities of the company and key business processes?
Response:
Risk Mitigation
Question: Score 1 of 1
You want to surf safely and anonymously on the Internet. Which of the following options will be best for you?
Response:
Use VPN.
Response:
Public Key
Hash
Digest
Secret Key
Question: Score 1 of 1
_____ attempts to change a DNS server’s records so that customers are redirected to a fake site.
Response:
DNS amplification
Spoofing
DNS hijacking
DDoS
Question: Score 1 of 1
In order to prevent collisions and protect password hashes from rainbow tables, Maria, the system administrator, decides to add random data
strings to the end of passwords before hashing. What is the name of this technique?
Response:
Extra hashing
Stretching
Salting
Masking
Question: Score 1 of 1
Attackers can use this tool for launching attacks against REST-, WADL-, and WSDL-based web services.
Response:
Burp
SoapUI
Hydra
Brutus
Question: Score 1 of 1
Jennys wants to send a digitally signed message to Molly. What key will Jennys use to sign the message, and how will Molly verify it?
Response:
Jennys will sign the message with her public key, and Molly will verify that the message came from Jenny's by using Jenny's private key.
Jennys will sign the message with Molly’s public key, and Molly will verify that the message came from Jennys by using Jenny’s public key
Jennys will sign the message with Molly’s private key, and Molly will verify that the message came from Jennys by using Jenny’s public key
Jennys will sign the message with her private key, and Molly will verify that the message came from Jennys by using Jenny’s public key
Question: Score 0 of 1
Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin
input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks.
What is the technique employed by Kevin to improve the security of encryption keys?
Response:
Key stretching
Key reinstallation
Question: Score 0 of 1
Which of the following is a tool that passively maps and visually displays an ICS/SCADA network topology while safely conducting device
discovery, accounting, and reporting on these critical cyber-physical systems?
Response:
GRASSMARLIN
Radare2
Fritzing
SearchDiggity
Question: Score 1 of 1
You know that an attacker can create websites similar to legitimate sites in pharming and phishing attacks. Which of the following is the difference
between them?
Response:
Pharming attack: an attacker provides the victim with a URL that is either misspelled or looks similar to the legitimate website's domain name.
Phishing attack: a victim is redirected to a fake website by modifying their host configuration file or exploiting DNS vulnerabilities.
Phishing attack: an attacker provides the victim with a URL that is either misspelled or looks similar to the legitimate website's domain name.
Pharming attack: a victim is redirected to a fake website by modifying their host configuration file or exploiting DNS vulnerabilities.
Question: Score 1 of 1
Jerrod is the CISO of a medium-sized bank. He receives an email that appears to be from an old college roommate, which is trying to get him to click
on a link. What is the best description of this attack?
Response:
Phishing
Whaling
Spimming
Spear phishing
Question: Score 1 of 1
Response:
Question: Score 1 of 1
During the pentest, Maria, the head of the blue team, discovered that the new online service has problems with the authentication mechanism. The
old password can be reset by correctly answering the secret question, and the sending form does not have protection using a CAPTCHA, which
allows a potential attacker to use a brute force attack.
What is the name of such an attack in the Enumeration of Common Disadvantages (CWE)?
Response:
User impersonation.
Question: Score 1 of 1
Carol is trying to find information about a specific IP address in Belgium. Which registry should she check?
Response:
LACNIC
APNIC
RIPE NCC
ARIN
Question: Score 1 of 1
There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the
wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption. What encryption protocol is being
used?
Response:
RADIUS
WPA3
WEP
WPA
Question: Score 1 of 1
Response:
Question: Score 1 of 1
Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark
to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands.
Which of the following commands was used by Clark to hijack the connections?
Response:
btlejack -f 0x129f3244 -j
btlejack -c any
Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed,
but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the
site is not secure and the web address appears different.
Response:
DoS attack
DNS hijacking
DHCP spoofing
Question: Score 1 of 1
Response:
OpenVAS
BeEF
NMAP
HPING
Question: Score 1 of 1
Response:
Botnet
Sniffing tool
DoS tool
Question: Score 1 of 1
Gunter has been performing testing of a Linux server. He is trying to erase his tracks. He wants to get rid of the history of all shell commands for
only the current shell. Which of the following is the best way to accomplish this?
Response:
shred ~/.bash_history
export HISTSIZE=0
history -w
ClearLogs
Question: Score 1 of 1
WPS is a rather troubled wireless network security standard. While it can make your life easier, it is also vulnerable to attacks. An attacker within
radio range can brute-force the WPS PIN for a vulnerable access point, obtain WEP or WPA passwords, and likely gain access to the Wi-Fi network.
However, first, the attacker needs to find a vulnerable point. Which of the following tools is capable of determining WPS-enabled access points?
Response:
ntptrace
net view
wash
macof
Question: Score 1 of 1
Which of the following attacks can you perform if you know that the web server handles the "(../)" (character string) incorrectly and returns the file
listing of a folder structure of the server?
Response:
Cross-site scripting.
Directory traversal.
SQL injection.
Denial of service.
Question: Score 1 of 1
It has to be the same number of characters as a physical signature and must be unique.
Question: Score 1 of 1
The ____ is responsible for verifying the person/entity requesting a digital certificate.
Response:
RA
CA
CRL
OCSP
Question: Score 0 of 1
Which of the following modes of IPSec should you use to assure integrity and confidentiality of data within the same LAN?
Response:
AH transport mode.
Question: Score 1 of 1
What order, from bottom to top, does the TCP/IP architecture use?
Response:
Question: Score 1 of 1
Implementing the security testing process early in the SDLC is the key to finding out and fixing the security bugs early in the SDLC lifecycle. The
security testing process can be performed in two ways, Automated or Manual web application security testing. Which of the proposed statements is
true?
Response:
Automatic and manual testing should be used together to better cover potential problems
Neural networks and artificial intelligence are already used in new tools and do not require additional actions
Manual testing is obsolete and should be completely replaced by automatic testing.
Automatic testing requires a lot of money and is still very imperfect, so it cannot be used for security
Question: Score 1 of 1
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
Response:
MAC flooding
DDoS attack
Question: Score 1 of 1
Response:
VRFY
RCPT
EXPN
NOOP
Question: Score 0 of 1
Which of the following option is a security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
Response:
DHCP relay
DAI
Port security
Spanning tree
Money Back Guarantee Testimonial FAQs Privacy Policy Terms and Conditions About Us Join Us Contact Us