Question: Please answer them ALL for me to understand 31. Noah, a penetration tester, has been asked by Company XYZ to perform a security test against

Please answer them ALL for me to understand

31. Noah, a penetration tester, has been asked by Company XYZ to perform a security test against the company network from an internal location. The owner of company XYZ has provided Noah with a network diagram, documentations, and assistance. Which of the following would best describe the type of test that Noah is about to perform?

Choice a

White Box

Choice b

Gray Box

Choice c

Black Box

Choice d

Zero Knowledge

32. After completing your reconnaissance and scanning, which of the following would be the next logical step performed by the Pen Tester?

Choice a

Privilege Escalation

Choice b

Clean up

Choice c

Enumeration

Choice d

Vulnerability Assessment

33. What protocol contains encrypted versions of telnet, ftp, and file copy for both Linux and Windows computers? Choose the best answer.

Choice a

802.1X

Choice b

SPF

Choice c

SSL

Choice d

Open SSH

34. Define Enumeration.

Choice a

"Enumeration refers to electrical signals that leak from a monitor, network cable or other electrical equipment."

Choice b

Enumeration is determining the manufacturer of a product based upon the MAC address of the network card.

Choice c

Enumeration is the process of obtaining information from computer systems without having to login to those systems.

Choice d

Enumeration is the process of translating photographs into a digital form that can be recognized by a computer.

35. Name Servers are the Penetration Tester's best friend. The Domain Name Registration database contains information about who registered a particular domain. What common command line as well as web based tool could be used to extract this information from the public database of Domain Name registration?

Choice a

whois

Choice b

SOA Query tool

Choice c

traceroute

Choice d

Resolv

36. Which of the following provides fast connectionless communication between devices?

Choice a

only IP V6

Choice b

UDP

Choice c

TCPIP

Choice d

SYN floods

37. What browser feature allows potential attackers to see hidden form fields?

Choice a

Check Fields

Choice b

Show All

Choice c

Open Code

Choice d

View Source

38. When Dave sends Janet a confidential message using RSA encryption, what key gets used to encrypt the message?

Choice a

Dave's Private Key

Choice b

Dave's Public key

Choice c

Janet's Private Key

Choice d

Janet's Public Key

39. Using Netcat, what would be the syntax to setup a listening back door from a compromised Windows Server that will spawn a shell when connecting to the remote server on port 777?

Choice a

nc -p 777 sh cmd.exe

Choice b

nc sh p 777 e cmd.exe

Choice c

nc -p 777 exec cmd.exe

Choice d

nc -L -p 777 -e cmd.exe

40. Which of the following requires user action to conduct malicious actions?

Choice a

Virus

Choice b

Worms

Choice c

Trojans

Choice d

Logic Bombs

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!