logo

Crowdly

Browser

Add to Chrome

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Which of the following is a good way to attempt to quickly identify the operating system of your target?
0%
0%
0%
0%
View this question
Which of the following is not considered a violation of confidentiality?
0%
14%
86%
0%
View this question
You are configuring rules for your Snort installation and want to have an alert message of "Attempted FTP" on any FTP packet coming from an outside address intended for one of your internal hosts. Which of the following rules are correct for this situation?
0%
0%
0%
0%
View this question
Which hash algorithm is used by NTLMv2?
20%
80%
0%
0%
View this question
Phishing, pop-ups, and IRC channel use are all examples of which type of social engineering attack?
50%
50%
0%
0%
View this question
Is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes?
0%
0%
0%
0%
0%
View this question
An ethical hacker is ACK scanning against a network segment he knows is sitting behind a stateful firewall. If a scan packet receives no response, what does that indicate?
0%
0%
0%
100%
View this question
You are port scanning a system and begin sending TCp packets with the FIN flag set. A response from the host on a particular port comes back as RST/ACK. Which of the following is a true statement regarding the response?
0%
0%
0%
0%
View this question
Destination unreachable administratively prohibited messages can inform the hacker to what?
0%
43%
0%
57%
View this question
You've decided  to begin scanning  against a target organization but want to keep your efforts as quiet as possible.  Which IDS evasion technique splits the TCp header among multiple packets?
0%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome