Exam questions
Please choose the best answer to the following questions. Some questions may have more than one possible answer, as indicated in the question:
- When is it appropriate to test another person's system?
- If you've been given permission or have been invited to do so
- If you believe the system has been hacked
- When you've discovered a vulnerability in the system
- If you believe the system is valuable
- If you were using the Shodan web service, which device would you use?
- Web servers
- IoT
- Mobile
- Cloud storage servers
- Which type of scanning is a packet with all flags set?
- SYN scan
- TCP connect
- Full open scan
- XMAS scan
- Which of the following best describes enumeration?
- User and machine name identification
- Identifying the network's active systems
- Password cracking
- Router and firewall identification
- To find a vulnerability, an attacker sends probes and forged requests to a target. Which kind of scan is being performed?
- Active
- Passive
- Flooding
- MiTM
- Which hashing...