GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

Author Archives: Anonymous

Your company has a document that spells out exactly what emp…

Your company has a document that spells out exactly what employees are allowed to do on their computer systems. It also defines what is prohibited and what consequences await those who break the rules. A copy of this document is signed by all employees prior to their network access. Which of the following best describes this policy?

Read Details

Which of the following statements is true regarding port sca…

Which of the following statements is true regarding port scanning:

Read Details

While pen-testing a client, you discover LM hashing, with no…

While pen-testing a client, you discover LM hashing, with no salting, is still while for backward compatibility on most systems. One stolen password hash reads 9FAF6B755DC38E12AAD3B435B51404EE. Is this user following good password procedures?

Read Details

Which of the following is not a recommended step in recoveri…

Which of the following is not a recommended step in recovering from a malware infection?

Read Details

Which footprinting tool or technique can be used to find the…

Which footprinting tool or technique can be used to find the names and addresses of employees or technical points of contact?

Read Details

What flag or flags are sent in the segment during the second…

What flag or flags are sent in the segment during the second step of the TCP three-way handshake?

Read Details

A pen tester is attempting to use nslookup and has the tool…

A pen tester is attempting to use nslookup and has the tool in interactive mode for the search. Which command should be used to request the appropriate records?

Read Details

An ethical hacker is hired to test the security of a busines…

An ethical hacker is hired to test the security of a business network. The CEH is given no prior knowledge of the network and has a specific framework in which to work, defining boundaries, nondisclosure agreements, and the completion date. Which of the following is a true statement?

Read Details

In which stage of an ethical hack would the attacker activel…

In which stage of an ethical hack would the attacker actively apply tools and techniques to gather more in-depth information on the targets?

Read Details

An auditor is performing a walkthrough of a server environme…

An auditor is performing a walkthrough of a server environment. Regarding a set of production servers, the systems engineer has told the auditor that the systems are operating in an “active-active” configuration. What can the auditor conclude from this?

Read Details

Posts pagination

Newer posts 1 … 44,631 44,632 44,633 44,634 44,635 … 81,685 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top