Podcast
Questions and Answers
What is the correct operator to use to find all pages with the words SQL and version in their titles?
What is the correct operator to use to find all pages with the words SQL and version in their titles?
Which of the following is not an internet research tool?
Which of the following is not an internet research tool?
How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?
How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?
What information gathering technique is Sarah using when she befriends an employee to learn their personal details?
What information gathering technique is Sarah using when she befriends an employee to learn their personal details?
Signup and view all the answers
Dan wants to protect his DNS service from reconnaissance. What action should he take?
Dan wants to protect his DNS service from reconnaissance. What action should he take?
Signup and view all the answers
What could be a potential consequence if reconnaissance tools are used excessively?
What could be a potential consequence if reconnaissance tools are used excessively?
Signup and view all the answers
What encryption formats should be used to store usernames and passwords securely?
What encryption formats should be used to store usernames and passwords securely?
Signup and view all the answers
What does the command 'lastlog' typically show?
What does the command 'lastlog' typically show?
Signup and view all the answers
Which port is commonly used for zone transfers to access information?
Which port is commonly used for zone transfers to access information?
Signup and view all the answers
How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?
How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?
Signup and view all the answers
Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?
Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?
Signup and view all the answers
Which of the following provides a list of resolved vulnerabilities?
Which of the following provides a list of resolved vulnerabilities?
Signup and view all the answers
What action should be taken to limit the sharing of critical information?
What action should be taken to limit the sharing of critical information?
Signup and view all the answers
When sending packets between computers to indicate that you are done sending information, which flag should you send?
When sending packets between computers to indicate that you are done sending information, which flag should you send?
Signup and view all the answers
In network infrastructure security, which evasion technique involves splitting packets?
In network infrastructure security, which evasion technique involves splitting packets?
Signup and view all the answers
Which online tool is commonly used to obtain server and web server information?
Which online tool is commonly used to obtain server and web server information?
Signup and view all the answers
In an Xmas tree scan, which TCP flag will be sent if the port is closed?
In an Xmas tree scan, which TCP flag will be sent if the port is closed?
Signup and view all the answers
Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?
Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?
Signup and view all the answers
When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?
When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?
Signup and view all the answers
Which port number is typically used to obtain a snippet of information from a target system?
Which port number is typically used to obtain a snippet of information from a target system?
Signup and view all the answers
What best describes Telnet?
What best describes Telnet?
Signup and view all the answers
During which phase of the ethical hacking process do you gather information about system configurations, software, and services?
During which phase of the ethical hacking process do you gather information about system configurations, software, and services?
Signup and view all the answers
How do you scan all ports on a system using SuperScan?
How do you scan all ports on a system using SuperScan?
Signup and view all the answers
What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?
What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?
Signup and view all the answers
Which best describes active sniffing in a security assessment context?
Which best describes active sniffing in a security assessment context?
Signup and view all the answers
In which assessment tool is data always encrypted at rest and in transit?
In which assessment tool is data always encrypted at rest and in transit?
Signup and view all the answers
In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?
In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?
Signup and view all the answers
What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?
What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?
Signup and view all the answers