The configuration allows a wired or wireless network interface controller to pass all trafice it receives
to the central processing unit (CPU), rather than passing only the frames that the controller is
intended to receive.
Which of the following is being described?
B
In Risk Management, how is the term “likelihood” related to the concept of “threat?”
D
While performing online banking using a web browser, a user receives an email that contains a link
to an interesting Web site. When the user clicks on the link, another web browser session starts and
displays a video of cats playing a piano. The next business day, the user receives what looks like an
email from his bank, indicating that his bank account has been accessed from a foreign country. The
email asks the user to call his bank and verify the authorization of a funds transfer that took place.
What web browser-based security vulnerability was exploited to compromise the user?
A
Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in
software applications?
A
An incident investigator asks to receive a copy of the event from all firewalls, prosy servers, and
Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible
breach of security. When the investigator attempts to correlate the information in all of the logs the
sequence of many of the logged events do not match up.
What is the most likely cause?
C
This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough
data packets have been captured. It implements the standard FMS attach along with some
optimizations like Korek attacks, as well as the PTW attack, thus making the attack much faster
compared to other WEP cracking tools.
Which of the following tools is being described?
D
Which of the following tools is used to analyze the files produced by several packet-capture programs
such as tcpdump, WinDump, Wireshark, and EtherPeek?
C
You have compromised a server on a network and successfully open a shell. You aimed to identify all
operating systems running on the network. However, as you attempt to fingerprint all machines in
the machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server:~$nmap –T4 –O 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx.
QUITTING!
What seems to be wrong?
D
Which of the following is the greatest threat posed by backups?
A
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to
go to
www.MyPersonalBank.com
, that the user is directed to a phishing site.
Which file does the attacker need to modify?
A
Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a
file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a
windows appears stating, “This word document is corrupt.” In the background, the file copies itself to
Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious
binaries. What type of malware has Jesse encountered?
A
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering
the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data
theft through a technique known wardriving.
Which algorithm is this referring to?
A
What is the best description of SQL Injection?
D
Which of the following is the successor of SSL?
C
As a Certified Ethical hacker, you were contracted by a private firm to conduct an external security
assessment through penetration testing.
What document describes the specified of the testing, the associated violations, and essentially
protects both the organization’s interest and your li abilities as a tester?
B