Podcast
Questions and Answers
What is the correct operator to use to find all pages with the words SQL and version in their titles?
What is the correct operator to use to find all pages with the words SQL and version in their titles?
- allintitle: SQL version (correct)
- inurl: SQL version
- allinurl: SQL version
- inurl: SQL inurl: version
Which of the following is not an internet research tool?
Which of the following is not an internet research tool?
- Google cloud
- Webpages
- Maltego
- Azure (correct)
How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?
How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?
- Using DNS servers
- Using IPs
- Using user IP groups (correct)
- Using split DNS
What information gathering technique is Sarah using when she befriends an employee to learn their personal details?
What information gathering technique is Sarah using when she befriends an employee to learn their personal details?
Dan wants to protect his DNS service from reconnaissance. What action should he take?
Dan wants to protect his DNS service from reconnaissance. What action should he take?
What could be a potential consequence if reconnaissance tools are used excessively?
What could be a potential consequence if reconnaissance tools are used excessively?
What encryption formats should be used to store usernames and passwords securely?
What encryption formats should be used to store usernames and passwords securely?
What does the command 'lastlog' typically show?
What does the command 'lastlog' typically show?
Which port is commonly used for zone transfers to access information?
Which port is commonly used for zone transfers to access information?
How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?
How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?
Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?
Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?
Which of the following provides a list of resolved vulnerabilities?
Which of the following provides a list of resolved vulnerabilities?
What action should be taken to limit the sharing of critical information?
What action should be taken to limit the sharing of critical information?
When sending packets between computers to indicate that you are done sending information, which flag should you send?
When sending packets between computers to indicate that you are done sending information, which flag should you send?
In network infrastructure security, which evasion technique involves splitting packets?
In network infrastructure security, which evasion technique involves splitting packets?
Which online tool is commonly used to obtain server and web server information?
Which online tool is commonly used to obtain server and web server information?
In an Xmas tree scan, which TCP flag will be sent if the port is closed?
In an Xmas tree scan, which TCP flag will be sent if the port is closed?
Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?
Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?
When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?
When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?
Which port number is typically used to obtain a snippet of information from a target system?
Which port number is typically used to obtain a snippet of information from a target system?
What best describes Telnet?
What best describes Telnet?
During which phase of the ethical hacking process do you gather information about system configurations, software, and services?
During which phase of the ethical hacking process do you gather information about system configurations, software, and services?
How do you scan all ports on a system using SuperScan?
How do you scan all ports on a system using SuperScan?
What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?
What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?
Which best describes active sniffing in a security assessment context?
Which best describes active sniffing in a security assessment context?
In which assessment tool is data always encrypted at rest and in transit?
In which assessment tool is data always encrypted at rest and in transit?
In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?
In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?
What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?
What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?