- Which tool can be used to perform session splicing attacks?
- Which of the following characteristics is not true about the Simple Object Access Protocol?
- According to the Payment Card Industry Data Security Standard, when is it necessary to conduct external and internal penetration testing?
- What scanning technique does Alex use when he splits the TCP Header into many packets to make it difficult to determine their purpose?
- What kind of attack does Antonio perform when he uses several fake identities to create an illusion of traffic congestion in IoT networks?
- Which of the following wireless standards has a bandwidth of up to 54 Mbit/s and signals in a regulated frequency spectrum around 5 GHz?
- Which IDS evasion method depends on the Time-to-Live (TTL) fields of a TCP/IP packet?
- What is the method of determining the movement of a data packet from an untrusted external host to a protected internal host through a firewall?
- What is the name of the hacker's work stage where they gather maximum information about the company before attacking?
- Identify the Secure Hashing Algorithm that produces a 160-bit digest based on principles similar to MD4 and MD5.
- Which Nmap command allows you to most reduce the probability of detection by IDS when scanning common ports?
- What is a set of extensions to DNS that provide origin authentication, authenticated denial of existence, and data integrity but not availability or confidentiality?
- Which web application attack injects the special character elements "Carriage Return" and "Line Feed" into the user’s input?
- Which scanning technique will Elon use to make it difficult for a packet filter to determine the packet's purpose?
- What conclusion can you make from the given log output of a machine with multiple port scan attempts?
- What problem could Michael identify when websites are unreachable via URL but accessible via IP address?
- Which conceptual characteristic of an anomaly-based IDS makes it different from a signature-based IDS?
- Which command launches the Computer Management Console from "Run" as a local administrator in Windows 7?
- What type of attack did Victor use when he sent a phishing email using a spoofed boss's email address?
- Which regulation defines security and privacy controls for all U.S. federal information systems except those related to national security?
- Which Nmap command-line flag sets a stealth scan?
- What best describes two-factor authentication for a credit card (using a card and PIN)?
- What type of vulnerability is present when modifying URL parameters changes the displayed data?
- Which method will best suit Mark when his software methods fail to extract cryptographic keys?
- Which command-line tool is known as "Wireshark for CLI"?
- What is the best method to protect confidential information on a stolen laptop while traveling?
- What type of alert occurs when an IDS registers an attack, but it is actually a legitimate activity?
- Identify the type of jailbreaking that allows user-level access but not iBoot-level access.
- What type of attack are you performing if you make interactive queries, choosing plaintexts based on previous encryptions?
- Which of the following best describes code injection?
- The attacker tries to take advantage of a vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key.
- What are the two main conditions for a digital signature?
- Which of the following is an encryption technique where data is encrypted by a sequence of photons that have a spinning trait while traveling from one end to another?
- Adam is a shopaholic, and he constantly surfs on the Internet in search of discounted products. The hacker decided to take advantage of this weakness and sent a fake email with a deceptive link.
- Which of the following parameters in Nmap helps evade IDS or firewalls?
- Which of the following commands checks for valid users on an SMTP server?
- What firewall evasion scanning technique makes use of a zombie system with low network activity and fragment identification numbers?
- What Wireshark filter will show the connections from the Snort machine to the Kiwi Syslog machine?
- What type of password attack uses statistical analysis to determine character placement probabilities?
- What is the common name for a vulnerability disclosure program opened by companies on platforms such as HackerOne?
- A DDoS attack is performed at layer 7 to take down web infrastructure by sending partial HTTP requests.
- What host discovery technique must be used to find active devices hidden behind a firewall?
- What kind of footprinting technique is used to gather domain information such as the target domain name, contact details, and registration details?
- What type of SQL injection attack returns no error messages and extracts data using conditional responses?
- Which rootkit is characterized by adding or replacing OS kernel code to hide a backdoor?
- What is the process of disassembling a mobile application to analyze its design flaws?
- What Nmap command quickly identifies all active machines in a network?
- Which of the following scanning techniques uses TCP SYN half-open scans to remain undetected?
- What is the name of a proxy-based web application security testing tool?
- What is the name of the attack that hijacks Bluetooth Low Energy (BLE) connections using Btlejack?
- What Google advanced search operator helps an attacker find websites similar to a specified target URL?
- What framework contains tools to facilitate data collection from open sources?
- What is the name of a scanning technique where an attacker infects some hosts and uses them to spread malware?
- What is the difference between white-hat, black-hat, and gray-hat hackers?
- What encryption method is used when data is encrypted using a quantum-based key exchange system?
- What SQL injection technique forces a database error to reveal information?
- What tool is used to decrypt hashed passwords obtained during penetration testing?
- What advanced attack technique exploits WPA3 vulnerabilities to recover keys?
- What is the scanning technique that detects live systems by sending ARP requests?
- What type of attack is performed by modifying a session token to gain unauthorized access?
Created
February 12, 2025 17:40
-
-
Save sudosuraj/9a0d39d9b45a4f3fc6cb855d2714519d to your computer and use it in GitHub Desktop.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment