1.
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
2.
ICMP ping and ping sweeps are used to check for active systems and to check
3.
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
4.
A pentester gains acess to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
5.
The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106: What is most likely taking place?
6.
A newly discovered flaw in a software application would be considered which kind of security vulnerability?
7.
What are the three types of authentication?
8.
What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?
9.
While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?
10.
Which of the following business challenges could be solved by using a vulnerability scanner?