Cybersecurity professionals also have some must-read literature. In this article, we have collected five books that can be put at the top of the list or kept on hand as desktop books. All…
Read moreQUESTION 300 Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? A. Dsniff B. John the Ripper C. Snort D. Nikto Correct Answer: D QUESTION 301…
Read moreQUESTION 277 Which of the following is the successor of SSL? A. GRE B. IPSec C. RSA D. TLS Correct Answer: D QUESTION 278 This international organization regulates billions of transactions daily and…
Read moreQUESTION 254 Which of the following is assured by the use of a hash? A. Authentication B. Confidentially C. Availability D. Integrity Correct Answer: D QUESTION 255 Risks=Threats x Vulnerabilities is referred to…
Read moreQUESTION 231 Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company? A. Voice B. Fingerprints C. Iris patterns D. Height and Weight…
Read moreQUESTION 208 A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants…
Read moreQUESTION 185 What is the role of test automation in security testing? A. It is an option but it tends to be very expensive. B. It should be used exclusively. Manual testing is…
Read moreQUESTION 162 Which of the following Nmap commands will produce the following output? A. nmap –sT –sX –Pn –p 1-65535 192.168.1.1 B. nmap –sN –Ps –T4 192.168.1.1 C. nmap –sS –sU –Pn –p…
Read moreQUESTION 139 An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next? A. He will create a SPAN entry on…
Read moreQUESTION 116 A virus that attempts to install itself inside the file it is infecting is called? A. Tunneling virus B. Cavity virus C. Polymorphic virus D. Stealth virus Correct Answer: B QUESTION…
Read moreQUESTION 93 Which of the following security policies defines the use of VPN for gaining access to an internal corporate network? A. Network security policy B. Information protection policy C. Access control policy…
Read moreQUESTION 70 Based on the below log, which of the following sentences are true? Mar 1, 2016, 7:33:28 AM 10.240.250.23 – 54373 10.249.253.15 – 22 tcp_ip A. SSH communications are encrypted it’s impossible…
Read moreQUESTION 47 The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation? A. ACK…
Read moreQUESTION 24 A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply…
Read moreQUESTION 1 An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed? A. Reverse Social Engineering B….
Read more1. A process is nothing but a running instance of a program. True or False? a. True b. False 2. Which of the following Linux commands is used to check files opened by…
Read moreAs you prepare for your pentester interview, you may be considering which questions the employer is going to ask you. While there’s no way to know for sure what topics will be covered…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 81: Explain the basic steps involved in converging a link state inter network. Answer: Each router floods a…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 61: What is a summary route? In the context of static routing, how are summary routes useful? Answer:…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 41: What is fragmentation? What fields of the IP header are used for fragmentation? Answer: Routers perform fragmentation…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 21: What is the primary purpose of a LAN? Answer: The primary purpose of a local-area network is…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 1: Which layer of the OSI model is responsible for reliable connections? Answer: The Transport layer of the…
Read more