Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?
Answer : D
Identify the attack represented in the diagram below:
Answer : B
Reference:http://en.wikipedia.org/wiki/Session_hijacking
If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the following attacks?
Answer : D
Reference:https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
DNS information records provide important data about:
Answer : B
Which of the following has an offset field that specifies the length of the header and data?
Answer : D
Identify the type of firewall represented in the diagram below:
Answer : A
Reference:http://www.technicolorbroadbandpartner.com/getfile.php?id=4159(page 13)
The firstand foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems.
Answer : A
One of the steps in information gathering is to run searches on a company using complex keywords in Google.
Answer : C
Reference:http://blog.hubspot.com/blog/tabid/6307/bid/1264/12-Quick-Tips-To-Search-
Google-Like-An-Expert.aspx(specific document types)
Wireless communication allows networks to extend to places that might otherwise go untouched by the wired networks. When most peoplesay Wireless these days, they are referring to one of the 802.11 standards. There are three main 802.11 standards: B, A, and
G. Which one of the following 802.11 types uses DSSS Modulation, splitting the 2.4ghz band into channels?
Answer : A
What is the difference between penetration testingand vulnerability testing?
Answer : A
This is a group of people hired to give details of the vulnerabilities present in the system found after a penetration test. They are elite and extremely competent penetration testers and intrusion analysts. This team prepares a report on the vulnerabilities in the system,attack methods, and how to defend against them.
Answer : B
Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.
Answer : B
Which of the following methods is used to perform server discovery?
Answer : B
Reference:http://luizfirmino.blogspot.com/2011/09/server-discovery.html
Which among the following information is not furnished by the Rules of Engagement (ROE) document?
Answer : A
Snort, an open source network-based intrusion detection sensor, is the most widely installed NIDS in the world. It can be configured to run in the four modes. Which one of the following modes reads the packets off the network and displays them in a continuous stream on the console (screen)?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us