logo

Crowdly

Browser

Add to Chrome

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

STRIDE is often used in relation to assessing threats against applications or operating systems. Which of the following is not an element of STRIDE?
0%
0%
0%
0%
View this question
Within a full Wireshark capture file, you want to filter traffic to show packets with an IP address of 64.83.15.18 && tcp contains HR_admin that contain the string “HR_admin”. Which of the following filters would accomplish this task?
0%
0%
0%
0%
100%
View this question
You have an FTP service and an HTTP site on a single server. Which DNS record allows you to alias both services to the same record (IP address)?
0%
17%
0%
83%
View this question
Which of the following attacks is also known as “cross-guest VM breach”?
50%
0%
0%
50%
View this question
You want to perform banner grabbing against a machine (168.15.22.4) you sus- pect as being a web server. Assuming you have the correct tools installed, which of the following command-line entries will successfully perform a banner grab? (Choose all that apply.)
0%
0%
17%
83%
View this question
Which of the following is not part of EC-Council's  CEH scanning  methodology?
0%
0%
0%
0%
0%
100%
View this question
Which of the following describes the intended use of the sigverif tool?
0%
0%
0%
0%
View this question
Which of the following methods of concealment involves a hacker spoofing an IP address to have packets returned directly to him regardless of the routers between sender and receiver?
100%
0%
0%
0%
View this question
Which of the following tools provides visibility and security controls for servers in a cloud?
14%
0%
0%
86%
View this question
Which of the following  attacks an already-authenticated connection?
0%
0%
100%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome