The phase will increase the odds of success in later phases of the penetration test. It is
also the very first step in Information Gathering, and it will tell you what the“landscape”
looks like.
What is the most important phase of ethical hacking in which you need to spend a
considerable amount of time?
A.
Network Mapping
B.
Gaining access
C.
Footprinting
D.
Escalating privileges
Footprinting
Which of the following tools performs comprehensive tests against web servers, including
dangerous files and CGI's?
A.
Snort
B.
Dsniff
C.
Nikto
D.
John the Ripper
Nikto
In Risk Management, how is the term “likelihood” related to the concept of “threat?”
A.
Likelihood is the probability that a vulnerability is a threat-source.
B.
Likelihood is a possible threat-source that may exploit a vulnerability.
C.
Likelihood is the likely source of a threat that could exploit a vulnerability.
D.
Likelihood is the probability that a threat-source will exploit a vulnerability
Likelihood is the probability that a threat-source will exploit a vulnerability
You have successfully gained access to your client’s internal network and successfully
comprised a linux server which is part of the internal IP network. You want to know which
Microsoft Windows workstation have the sharing enabled.
Which port would you see listeningon these Windows machines in the network?
A.
1443
B.
3389
C.
161
D.
445
445
The heartland bug was discovered in 2014 and is widely referred to under MITRE’s
Common Vulnerabilities and Exposures (CVE) as CVE-2004-1060. Thisbug affects the
OpenSSL implementation of the transport Layer security (TLS) protocols defined in
RFC6520.
What types of key does this bug leave exposed to the Internet making exploitation of any
compromised system very easy?
A.
Root
B.
Private
C.
Shared
D.
Public
Root
Page 6 out of 25 Pages |
Previous |