Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a
file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a
windows appears stating, “This word document is corrupt.” In the background, the file copies itself to
Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious
binaries. What type of malware has Jesse encountered?
A
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering
the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data
theft through a technique known wardriving.
Which algorithm is this referring to?
A
What is the best description of SQL Injection?
D
Which of the following is the successor of SSL?
C
As a Certified Ethical hacker, you were contracted by a private firm to conduct an external security
assessment through penetration testing.
What document describes the specified of the testing, the associated violations, and essentially
protects both the organization’s interest and your li abilities as a tester?
B
Which of the following is not a Bluetooth attack?
B
PGP, SSL, and IKE are all examples of which type of cryptography?
C
Using Windows CMD, how would an attacker list all the shares to which the current user context has
access?
D
Which of these options is the most secure procedure for strong backup tapes?
A
What is the benefit of performing an unannounced Penetration Testing?
A