Which command can be used to show the current TCP/IP connections?
While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences.
He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com
. kiosk.adobe.com is
the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?
Which of the following statements is FALSE with respect to Intrusion Detection Systems?
A. Intrusion Detection Systems can be configured to distinguish specific content in network packets
B. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic
C. Intrusion Detection Systems require constant update of the signature library
D. Intrusion Detection Systems can examine the contents of the data n context of the network
Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He
begins by running a scan which looks for common misconfigurations and outdated software versions.
Which of the following tools is he most likely using?
What kind of detection techniques is being used in antivirus softwares that identifies malware by
collecting data from multiple protected systems and instead of analyzing files locally it's made on the
Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is
looking for an IDS with the following characteristics: - Verifies success or failure of an attack -
Monitors system activities Detects attacks that a network-based IDS fails to detect - Near real-time
detection and response - Does not require additional hardware - Lower entry cost Which type of IDS
is best suited for Tremp's requirements?
What is the purpose of DNS AAAA record?
OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool
and the correct syntax to connect to a web server?
You are performing a penetration test for a client and have gained shell access to a Windows
machine on the internal network. You intend to retrieve all DNS records for the internal domain, if
the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would you
type at the nslookup prompt to attempt a zone transfer?
John is an incident handler at a financial institution. His steps in a recent incident are not up to the
standards of the company. John frequently forgets some steps and procedures while handling
responses as they are very stressful to perform. Which of the following actions should John take to
overcome this problem with the least administrative effort?
Elliot is in the process of exploiting a web application that uses SQL as a back-end database. Hes
determined that the application is vulnerable to SQL injection, and has introduced conditional timing
delays into injected queries to determine whether they are successful. What type of SQL injection is
Elliot most likely performing?
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a _____
database structure instead of SQLs _____ structure. Because of this, LDAP has difficulty representing
Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in
Evil Corps lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-
501. What needs to happen before Matthew has full administrator access?
During an Xmas scan what indicates a port is closed?
Which utility will tell you in real time which ports are listening or in another state?