What are two things that are possible when scanning UDP ports? (Choose two.)
What is the best Nmap command to use when you want to list all devices in the same network quickly after you successfully identified a server whose IP address is 10.10.0.5?
Which of the following tools would MOST LIKELY be used to perform security audit on various of forms of network systems?
Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?
Which of the following command line switch would you use for OS detection in Nmap?
Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited due to vulnerabilities of varying web applications?
Which of the following is a restriction being enforced in “white box testing?”
The following are types of Bluetooth attack EXCEPT_____?
Which specific element of security testing is being assured by using hash?
A big company, who wanted to test their security infrastructure, wants to hire elite pen testers like you. During the interview, they asked you to show sample reports from previous penetration tests. What should you do?
One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the shortlisted pen testers that they may hire. During the interview with the CIO, he emphasized that he wants to totally eliminate all risks. What is one of the first things you should do when hired?
Which of the following is a vulnerability in GNU’s bash shell (discovered in September of 2014) that gives attackers access to run remote commands on a vulnerable system?
Name two software tools used for OS guessing? (Choose two.)
Which of the following is a form of penetration testing that relies heavily on human interaction and often involves tricking people into breaking normal security procedures?
Which of the following tools is used by pen testers and analysts specifically to analyze links between data using link analysis and graphs?