Question: Please answer them ALL for me to understand 31. Noah, a penetration tester, has been asked by Company XYZ to perform a security test against
Please answer them ALL for me to understand
31. Noah, a penetration tester, has been asked by Company XYZ to perform a security test against the company network from an internal location. The owner of company XYZ has provided Noah with a network diagram, documentations, and assistance. Which of the following would best describe the type of test that Noah is about to perform?
Choice a
White Box
Choice b
Gray Box
Choice c
Black Box
Choice d
Zero Knowledge
32. After completing your reconnaissance and scanning, which of the following would be the next logical step performed by the Pen Tester?
Choice a
Privilege Escalation
Choice b
Clean up
Choice c
Enumeration
Choice d
Vulnerability Assessment
33. What protocol contains encrypted versions of telnet, ftp, and file copy for both Linux and Windows computers? Choose the best answer.
Choice a
802.1X
Choice b
SPF
Choice c
SSL
Choice d
Open SSH
34. Define Enumeration.
Choice a
"Enumeration refers to electrical signals that leak from a monitor, network cable or other electrical equipment."
Choice b
Enumeration is determining the manufacturer of a product based upon the MAC address of the network card.
Choice c
Enumeration is the process of obtaining information from computer systems without having to login to those systems.
Choice d
Enumeration is the process of translating photographs into a digital form that can be recognized by a computer.
35. Name Servers are the Penetration Tester's best friend. The Domain Name Registration database contains information about who registered a particular domain. What common command line as well as web based tool could be used to extract this information from the public database of Domain Name registration?
Choice a
whois
Choice b
SOA Query tool
Choice c
traceroute
Choice d
Resolv
36. Which of the following provides fast connectionless communication between devices?
Choice a
only IP V6
Choice b
UDP
Choice c
TCPIP
Choice d
SYN floods
37. What browser feature allows potential attackers to see hidden form fields?
Choice a
Check Fields
Choice b
Show All
Choice c
Open Code
Choice d
View Source
38. When Dave sends Janet a confidential message using RSA encryption, what key gets used to encrypt the message?
Choice a
Dave's Private Key
Choice b
Dave's Public key
Choice c
Janet's Private Key
Choice d
Janet's Public Key
39. Using Netcat, what would be the syntax to setup a listening back door from a compromised Windows Server that will spawn a shell when connecting to the remote server on port 777?
Choice a
nc -p 777 sh cmd.exe
Choice b
nc sh p 777 e cmd.exe
Choice c
nc -p 777 exec cmd.exe
Choice d
nc -L -p 777 -e cmd.exe
40. Which of the following requires user action to conduct malicious actions?
Choice a
Virus
Choice b
Worms
Choice c
Trojans
Choice d
Logic Bombs
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
