Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A security professional is testing the Wi-Fi with MDK4 and wants to create the appearance of many wireless networks. Which of the following modes should

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
A security professional is testing the Wi-Fi with MDK4 and wants to create the appearance of many wireless networks. Which of the following modes should they use? Seloct one: W B D A A security analyst is looking at a packet capture in Wireshark and trying to find activity based on a certain user. Which of the following would represent a user field? Select one: CName Nbns SPAN User-Agent A new penetration tester is creating a summary of their first upcoming process and wants to follow the standard process. What step takes place after planning? Select one: Recon Analysis Scanning Gaining access A vulnerability has just gone through the mitigation phase of the vulnerability lifecycle. What is the next phase? Select one: Discover Manage Coordinate Document A penetration tester is conducting a nmap scan but wants to conserve bandwidth. Which setting should they use to perform this? Select one: T2 T3 T4 T1 A security tester is conducting war driving for several sites. Which of the following tools could they use to heip in this cffort? Select one: Censys WIGLE DAST ARP Poisoning A security professional is checking for domains based on certificates that are no longer allowed. What could they check for this? Select one: SET CRL OCsp SAN A security professional is trying to evaluate a website for web-specific vulnerabilities. Which of the following is the tool most suited towards this objective? Select one: Nikto Censys OpenVAS SQLmap A network contractor is setting up wireless for a small coffee shop and wants to make sure they are secured with a standard that uses 192 . bit encryption. Which of the following should they use? Select one: WEP WPA WPA3 WPA2 A security tester is conducting an assessment on a new network where NAC is employed. What is the most common way to bypass NAC? Select one: Advertise a fake MAC address Modify the port number Access an authenticated device Using decoys A student is studying penetration testing methodologies and is trying to narrow in their skil sets to web application testing. Which of the following should they focus on? Select one: OWASP Hacker Highschool NIST OSSTMM A security consultant is evaluating a website and finds out that the administrator has set up a device to stabilize network traffic across two or more servers. What is this called? Select one: Load balancer ACL WAF Firewall A security professional is looking for interesting targets on a public-facing web server. What would show them areas of the server that are not supposed to be crawled? Select one: Robots.txt Revocation list Secret Subject alternative name A security professional is performing an assessment against web servers and is currently in the reconnaissance phase. They are performing initial service enumeration by attempting to open a session with service and getting the service to identify itself. Which of the following tools are suited for this? (Select all that apply) Select one or more: Shodan wget netcat SET A project manager is preparing documentation that covers recurring costs and any unforeseen additional charges that may occur durin project without the need for an additional contract. Which of the following should they prepare? Select one: MSA SOW NVD SLA A medium-sized company is worried about their access points at various field sites and has asked their employees to drive around to search for open access points using a laptop or smartphone. What is this referred to as? Select one: Pharming WIGLE War driving Attack surface A penetration tester needs to craft a custom packet in order to bypass an intrusion Prevention System (IPS). What tools could they use to craft custom packets? (Select all that apply.) Select one or more: OpenVAS Metagoofil Hping 3 Scapy A security professional is looking for an organization's code that might have been posted publicly by developers. Which of the following sources is least likely to contain accidental posts by a company's developers? Select one: Github Reddit CloudForge Bitbucket A Linux systems administrator is concerned about data exfiltration from one of their DMZ servers through an encrypted connection. What common service should they disable on these DMZ servers for externally facing assets? Select one: Teinet FTP RDP SSH A security researcher is setting up an evil twin as part of a security conference demonstration. Which type of attack does an evil twin typically perform? Select one: Deauthentication Brute force Zone transfer Jamming A security penetration tester wants to try exfiltrating data by synthesizing images into. wav files. Which tool should they use to do this? Select one: Ostinato Coagula OpenStego Snow A penetration tester covertly follows an authorized employee who is unaware that anyone is behind them. What is this called? Select one: Piggybacking Scaling Badge cloning Tailgating

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions