1.
Which of the following is a passive wireless packet analyzer that works on Linux-based systems?
2.
Which service in a PKI will vouch for the identity of an individual or company?
3.
What mechanism in Windows prevents a user from accidentally executing a potentially malicious batch (.bat) or PowerShell (.ps1) script?
4.
Seth is starting a penetration test from inside the network. He hasn't been given any information about the network. What type of test is he conducting?
5.
What is the code written for?
6.
You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account. What should you do?
7.
An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
8.
Which system consists of a publicly available set of databases that contain domain name registration contact information?
9.
A penetration test was done at a company. After the test, a report was written and given to the company's IT authorities. A section from the report is shown below: Access List should be written between VLANs. Port security should be enabled for the intranet. A security solution which filters data packets should be set between intranet (LAN) and DMZ. A WAF should be used in front of the web applications. According to the section from the report, which of the following choice is true?
10.
In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?