8
8
Question Results
Question: Score 1 of 1
You've installed multiple files and processes on the compromised system. What should you also look at installing?
Response:
Registry keys
Root login
Rootkit
Question: Score 1 of 1
The attacker tries to take advantage of vulnerability where the application does not verify if the user is authorized to access the internal object via its
name or key. Which of the following queries best describes an attempt to exploit an insecure direct object using the name of the valid account "User
1"?
Response:
Question: Score 0 of 1
Theresa is concerned about her VPN. She wants to use a well-established protocol, but one that supports as many authentication methods as
possible. What should she choose?
Response:
IKE
L2TP
PPTP
ISAKMP
Question: Score 1 of 1
You must to identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered.
Which of the following nmap commands do you must use to perform the TCP SYN ping scan?
Response:
Question: Score 1 of 1
David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to
evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable
systems to reduce the impact and severity of vulnerabilities.
Response:
Verification
Vulnerability scan
Risk assessment
Remediation
Question: Score 1 of 1
In order to prevent collisions and protect password hashes from rainbow tables, Maria, the system administrator, decides to add random data
strings to the end of passwords before hashing. What is the name of this technique?
Response:
Masking
Stretching
Salting
Extra hashing
Question: Score 1 of 1
Response:
161
162
139
445
Question: Score 1 of 1
While performing an Nmap scan against a host, Pacla determines the existence of a firewall. In an attempt to determine whether the firewall is
stateful or stateless, which of the following options would be best to use?
Response:
-sA
-sT
-sX
-sF
Question: Score 0 of 1
You are scanning a target network using ping, and when targeting host A in the network, you get a 10, but when targeting host B, you get a
response. How would you interpret that?
Response:
Host B is a honeypot.
Question: Score 1 of 1
John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default
credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of loT
devices and detect whether they are using the default, factory-set credentials.
Response:
loTSeeker
loT Inspector
Azure loT Central
Question: Score 1 of 1
Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack
technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session ID to the target employee.
The session ID links the target employee to Boney’s account page without disclosing any information to the victim. When the target employee clicks
on the link, all the sensitive payment details entered in a form are linked to Boney’s account.
Response:
Forbidden attack
CRIME attack
Question: Score 1 of 1
Marketing department employees complain that their computers are working slow and every time they attempt to go to a website, they receive a
series of pop-ups with advertisements. Which of the following type of malwares infected their systems?
Response:
Spyware
Trojan
Adware
Virus
Question: Score 1 of 1
Bob, an attacker, has managed to access a target IoT device. He employed an online tool to gather information related to the model of the IoT device
and the certifications granted to it.
Which of the following tools did Bob employ to gather the above information?
Response:
search.com
EarthExplorer
FCC ID search
Question: Score 0 of 1
Todd is concerned about DoS attacks against his network. He is particularly worried about attacks that used malformed ICMP packets. What type of
attack is Todd concerned about?
Response:
PoD
Teardrop
Smurf
PDoS
Question: Score 1 of 1
Which following OSI layer is responsible for encoding and decoding data packets into bits?
Response:
Network layer
Session layer
Application layer
Question: Score 1 of 1
Amanda works as a senior security analyst and overhears a colleague discussing confidential corporate information being posted on an external
website.
When questioned on it, he claims about a month ago he tried random URLs on the company’s website and found confidential information. Amanda
visits the same URLs but finds nothing.
Response:
Pasthash.com
Search.com
Archive.org
Google cache
Question: Score 1 of 1
What is the name of a popular tool (or rather, an entire integrated platform written in Java) based on a proxy used to assess the security of web
applications and conduct practical testing using a variety of built-in tools?
Response:
Nmap
Wireshark
Burp Suite
CxSAST
Question: Score 1 of 1
The company "Usual company" asked a cybersecurity specialist to check their perimeter email gateway security. To do this, the specialist creates a
specially formatted email message:
From: [email protected]
To: [email protected]
Subject: Test message
Date: 5/8/2021 11:22
He sends this message over the Internet, and a "Usual company " employee receives it. This means that the gateway of this company doesn't
prevent _____.
Response:
Email Harvesting
Email Masquerading
Email Spoofing
Email Phishing
Question: Score 1 of 1
Which of the following is a vulnerability in modern processors such as Intel, AMD and ARM using speculative execution?
Response:
Launch Daemon
Application Shimming
Question: Score 1 of 1
Identify the encryption algorithm by the description: Symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size
of 64 bits for encryption, which includes large 8 × 32-bit S-boxes based on bent functions, modular addition and subtraction, key-dependent
rotation, and XOR operations. This cipher also uses a "masking" key and a "rotation" key for performing its functions.
Response:
GOST
AES
CAST-128
DES
Question: Score 1 of 1
Which of the following methods is best suited to protect confidential information on your laptop which can be stolen while travelling?
Response:
Hidden folders.
BIOS password.
Question: Score 0 of 1
Which of the following is an entity in a PKI that will vouch for the identity of an individual or company?
Response:
VA
KDC
CA
CR
Question: Score 0 of 1
Ethical hacker Jane Smith is attempting to perform an SQL injection attack. She wants to test the response time of a true or false response and
wants to use a second command to determine whether the database will return true or false results for user IDs.
Which two SQL injection types would give her the results she is looking for?
Response:
Question: Score 1 of 1
The attacker knows about a vulnerability in a bare-metal cloud server that can enable him to implant malicious backdoors in firmware. Also, the
backdoor can persist even if the server is reallocated to new clients or businesses that use it as an IaaS. What type of cloud attack can be performed
by an attacker exploiting the vulnerability discussed in the above scenario?
Response:
Cloud cryptojacking
Cloudborne attack
What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?
Response:
Question: Score 1 of 1
Response:
Telnet
Question: Score 1 of 1
With a(n) _____ attack, the attacker attempts, with very precise measurements of the time taken to execute algorithms, the attacker can attempt to
work backwards to the input.
Response:
service hijacking
cryptanalysis
timing
acoustic cryptanalysis
Question: Score 1 of 1
A competitor of a reputed IT firm has gathered sensitive information about the firm and launched similar products in the market by changing the
prices of the products, thereby causing adverse damage to the firm’s market position.
Response:
Corporate Espionage
Social Engineering
Business Loss
Information Leakage
Question: Score 1 of 1
You need to conduct a technical assessment of the network for a small company that supplies medical services. All computers in the company use
Windows OS. What is the best approach for discovering vulnerabilities?
Response:
Question: Score 1 of 1
Which of the following Google search strings will find documents in the URL that contains the keyword given?
Response:
inurl
allinurl
intitle
inname
Question: Score 1 of 1
Which cryptographic attack refers to the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or
torture?
Response:
Ciphertext-only Attack
Question: Score 1 of 1
Response:
issuing certificates
validating servers
Question: Score 1 of 1
Black-hat hacker Ivan created a fraudulent website to steal users' credentials. What of the proposed tasks does he need to perform so that users are
redirected to a fake one when entering the domain name of a real site?
Response:
SMS phishing
MAC Flooding
DNS spoofing
ARP Poisoning
Question: Score 1 of 1
Attackers can use this tool for launching attacks against REST-, WADL-, and WSDL-based web services.
Response:
Burp
Hydra
SoapUI
Brutus
Question: Score 1 of 1
Identify the technique by description: The attacker wants to create a botnet. Firstly, he collects information about a large number of vulnerable
machines to create a list. Secondly, they infect the machines. The list is divided by assigning half of the list to the newly compromised
machines. The scanning process runs simultaneously. This technique ensures a very fast spreading and installation of malicious code.
Response:
Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size
and obtained the following results:
- TTL: 64
- Window Size: 5840
Response:
Windows OS
Linux OS
Mac OS
Solaris OS
Question: Score 0 of 1
Based on the below log, which of the following sentences are true?
Response:
Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server
Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client
SSH communications are encrypted; it’s impossible to know who is the client or the server.
Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.
Question: Score 1 of 1
Black-hat hacker Ivan attacked the SCADA system of the industrial water facility. During the exploration process, he discovered that outdated
equipment was being used, the human-machine interface (HMI) was directly connected to the Internet and did not have any security tools or
authentication mechanism.
This allowed Ivan to control the system and influence all processes (including water pressure and temperature). What category does this
vulnerability belong to?
Response:
Code Injection.
Credential Management.
Memory Corruption.
Question: Score 1 of 1
Ivan, a black hacker, wants to attack the target company. He thought about the fact that vulnerable IoT devices could be used in the company. To
check this, he decides to use the tool, scan the target network for specific types of IoT devices and detect whether they are using the default,
factory-set credentials. Which of the following tools will Ivan use?
Response:
Bullguard IoT
Question: Score 1 of 1
You need to identify the OS on the attacked machine. You know that TTL: 64 and Window Size: 5840. Which is OS running on the attacked machine?
Response:
Linux OS
Windows OS
Mac OS
Question: Score 1 of 1
Identify Bluetooth attck techniques that is used in to send messages to users without the recipient's consent, for example for guerrilla marketing
campaigns?
Response:
Bluesnarfing
Bluebugging
Bluesmacking
Bluejacking
Question: Score 0 of 1
Which of the following tiers in the three-tier application architecture is responsible for moving and processing data between them?
Response:
Application Layer
Presentation tier
Logic tier
Data tier
Question: Score 1 of 1
By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via
the SMB service and occasionally entered your login and password in plaintext.
Response:
.bash_history
.profile
.xsession-log
.bashrc
Question: Score 1 of 1
___ is inherently insecure and does not provide strong authentication and encryption.
Response:
Question: Score 1 of 1
Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to
analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies
against attacks.
What is the technique used by Jacob in the above scenario to improve the security of the mobile application?
Response:
App sandboxing
Reverse engineering
Social engineering
Jailbreaking
Question: Score 1 of 1
When choosing a biometric system for your company, you should take into account the factors of system performance and whether they are
suitable for you or not. What determines such a factor as the throughput rate?
Response:
The maximum number of sets of data that can be stored in the system.
The probability that the system incorrectly matches the input pattern to a non-matching template in the database.
The probability that the system fails to detect a biometric input when presented correctly.
Question: Score 1 of 1
At what stage of the cyber kill chain theory model does data exfiltration occur?
Response:
Weaponization
Installation
Actions on objectives
Question: Score 1 of 1
Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed,
but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the
site is not secure and the web address appears different.
DoS attack
DNS hijacking
DHCP spoofing
Question: Score 1 of 1
Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting
method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.
Response:
Question: Score 1 of 1
In which of the following IDS evasion techniques does an attacker split the attack traffic into many packets, such that no single packet triggers the
IDS?
Response:
Flooding
Session Splicing
Encryption
Unicode Evasion
Question: Score 1 of 1
Black-hat hacker Ivan attacked a large DNS server. By poisoning the cache, he was able to redirect the online store's traffic to a phishing site. Users
did not notice the problem and believed that they were on the store's actual website, so they entered the data of their accounts and even bank cards.
Before the security system had time to react, Ivan collected a large amount of critical user data. Which option is best suited to describe this attack?
Response:
SPIT attack
Spear-phishing
Phishing
Pharming
Question: Score 1 of 1
Which of the following web application attack inject the special character elements "Carriage Return" and "Line Feed" into the user’s input to trick
the web server, web application, or user into believing that the current object is terminated and a new object has been initiated?
Response:
HTML Injection.
Log Injection.
Server-Side JS Injection.
CRLF Injection.
Question: Score 1 of 1
Response:
A pop-up appears to a user stating, "You have won money! Click here to claim your prize!"
A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this
issue."
A banner appears to a user stating, "Your password has expired. Click here to update your password."
A banner appears to a user stating, "Your order has been delayed. Click here to find out your new delivery date."
Question: Score 0 of 1
An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with
only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was
established, the attacker used automated tools to crack WPA2-encrypted messages.
Response:
Side-channel attack
Timing-based attack
Cache-based attack
Question: Score 1 of 1
Incorrectly configured S3 buckets are among the most common and widely targeted attack vectors. All it takes is one or two clicks to upload
sensitive data to the wrong bucket or change permissions on a bucket from private to public. Which one of the following tools can you use to
enumerate bucket permissions?
Response:
Sysdig
Ruler
S3 Inspector
DumpsterDiver
Question: Score 0 of 1
Response:
Question: Score 1 of 1
Which of the following frameworks contains a set of the most popular tools that facilitate your tasks of collecting information and data from open
sources?
Response:
BeEF
OSINT framework
WebSploit Framework
Question: Score 0 of 1
_____ attempts to change a DNS server’s records so that customers are redirected to a fake site.
Response:
DNS hijacking
DNS amplification
Spoofing
DDoS
Question: Score 1 of 1
Jude, a pen tester, examined a network from a hacker’s perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such
as firewalls, routers, and servers. In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate
network.
What is the type of vulnerability assessment that Jude performed on the organization?
Response:
Host-based assessment
External assessment
Passive assessment
Application assessment
Question: Score 1 of 1
Response:
User
Device
Server
Network
Question: Score 0 of 1
Which IOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?
Response:
Semi-untethered jailbreaking
Semi-tethered jailbreaking
Tethered jailbreaking
Untethered jailbreaking
Question: Score 0 of 1
In a(n) ___ jailbreak, if the user turns the device off and back on, the device will start up completely. It will no longer have a patched kernel, but it will
still be usable for normal functions.
Response:
free-tethered
semi-tethered
untethered
tethered
Money Back Guarantee Testimonial FAQs Privacy Policy Terms and Conditions About Us Join Us Contact Us