30 Questions
What encryption technology is implemented by Debry Inc.?
WPA3
What attack technique did the attacker use to crack the passwords of the industrial control systems?
Side-channel attack
What protocol is known as the simultaneous authentication of equals (SAE)?
WPA
What strategy did the attacker employ to recover passwords, checking one character at a time?
Brute-force attack
Which attack involves linking the attacker's MAC address with the target system's IP address through fake ARP messages?
Man-in-the-middle attack
What tool did Miley use to intercept, steal, modify, and block sensitive communication on the target network?
Packet sniffer
What is the purpose of using the ICMP timestamp ping scan option in Zenmap?
To identify the uptime of a target system
In the context of mobile application security, what does reverse engineering involve?
Extracting source code and analyzing application design flaws
Which Metasploit post-exploitation module is used for privilege escalation on Windows systems?
getsystem
How can an attacker leverage the 'related:' Google advanced search operator?
To uncover websites related to a specified target URL
What is a key piece of information obtained during successful SMTP enumeration?
Confirmation of valid users and email addresses
Which technique can Jacob use to improve the security of the mobile application in the scenario provided?
Reverse engineering
What type of attack was James conducting on Emily in the scenario?
Geolocation tracking attack
Which security incident is the OT security tool designed to protect the organization's critical infrastructure against?
Zero-day attacks
What tool did John use to anonymously query the LDAP service for sensitive information from the organization?
HULK
Which type of cybersecurity threat is NOT mentioned as a potential risk to the organization's industrial networks?
Physical damage
What kind of attack involves searching for sensitive information like usernames and server names through an LDAP service?
LDAP enumeration attack
What type of tool is BalenaCloud based on the context provided?
OT security tool
What is a strong indication that a web server is vulnerable to a certain attack?
.cms
Which of the following is the best example of a scareware attack?
A pop-up warning about spyware infection
What term refers to the act of hackers making a phishing message look similar to the internal email used by the target company?
Reconnaissance
In the context of the text, what does Kevin, the encryption specialist, enhance to improve security?
Security of keys for encryption and authentication
Which method does an attacker employ to perform social engineering against unsuspecting employees?
Scareware attack
What is the term for the time a hacker spends researching to obtain information about a target company for a phishing attack?
Reconnaissance
What type of malware did the attacker use to bypass the company’s application whitelisting?
File-less malware
In ethical hacking methodology, infecting a system with malware and using phishing to gain credentials relates to which phase?
Gaining access
What attack is likely to have occurred if Alice and John accessed Jane's wireless network without a password?
Piggybacking
The law designed to improve the accuracy and accountability of corporate disclosures, created after the Enron and WorldCom scandals, is known by what acronym?
SOX
Which protocol can be used to secure an LDAP service against anonymous queries?
RADIUS
Susan wants her web API to update other applications instantly with real-time information. Which feature does she use for this purpose?
Push APIs
Test your knowledge on Wi-Fi encryption technology and password cracking techniques. Explore concepts such as SAE key establishment protocol, WPA, WPA2, WPA3, and WEP encryption standards, as well as password cracking strategies like employing loop strategy. Challenge yourself with this quiz!
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free