Certified Ethical Hacker Pro

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account [...]

Social engineering

Which of the following best describes Qualys Vulnerability Management assessment tool.

It is a cloud-based service that keeps all of your data in a private virtual database

Karen received a report of all of the mobile devices on the network. This report showed the total risk score[...]

A vulnerability scanner

20493750979830712-498uoidjflkdas;lkafjoieah jsd are the possible values in

Ascii-32-95

The results section of an assessment report contains four sub topics. Which of the following sub sections contains the origin of the scan.

Classification

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled.

Dumpster diving

Which of the following would be the best open-source tool to use if you are looking for a web server scanner.

Nikto

Which of the following includes a list of resolved vulnerabilities

Security vulnerability summary

You are looking for a vulnerability assessment tool that detects vulnerabilities in mobile devices and gives you a report containing a total risk score.

SecurityMetrics Mobile

Which of the following techniques involves adding random bits of data to a password before it is stored as a hash

password salting

Clive, a penetration tester, is scanning for vulnerabilities on the network, specifically outdated versions of Apple OS. Which of the following tools should he use.

Nessus

You have just run the John the Ripper command shown in the image. Which of the following was the command used for?

To extract the password hashes and save them in the secure.txt file

Which of the following best describes shoulder surfing

Someone nearby watches you enter your password on your computer and records it.

limited time

rainbow attack

Plaintext

charset


Set pelajaran terkait

Chapter 26 Emergency Care 13th Edition

View Set

C723 - Multiple Choice Questions

View Set

#6 CIS 525 - CyberSecurity - McMurtrey - Study for Final Exam

View Set

Biochem C785 - DNA/RNA and misc questions

View Set

Practice quiz Unit 6 Respiratory

View Set

Life Policy Provisions, Life Insurance Lesson 4, Lesson 8: Types of Life Insurance Policies, AFLAC LESSON 7, General Group Insurance Concepts, federal and state regulation, contract law, underwriting an insurance policy, Lesson 2: Ethics and Professi...

View Set