Match the TCP/IP model layer to the function.
Match the TCP/IP model layer to the function. application ---> represents data to the user, data encoding, and dialog control. network access ---> controls hardware devices and media that make up the…
Match the TCP/IP model layer to the function. application ---> represents data to the user, data encoding, and dialog control. network access ---> controls hardware devices and media that make up the…
Which statement is true about the TCP/IP and OSI models? The OSI Layer 7 and the TCP/IP application layer provide identical functions. The TCP/IP network access layer has similar functions…
Which three acronyms/initialisms represent standards organizations? (Choose three.) IANA IEEE MAC IETF TCP/IP OSI Explanation and Hint: The application layer of the TCP/IP model maps to the top three layers…
Which option is a Linux distribution tool for forensic evidence collection? CAINE BeEF Immunity Debugger Metasploit Explanation & Hint: The Computer Aided Investigative Environment (CAINE) contains numerous tools that help…
Which encoding method can secretly exfiltrate confidential data in the payload of DNS packets? Base64 MD5 ASCII HTML Explanation & Hint: Malware can use Base64 encoding to put sensitive data…
Which tool can be used with Metasploit to maintain stealth and avoid detection from security controls implemented by an organization? Veil Empire Patator Security Onion Explanation & Hint: Veil is…
Which option is a PowerShell-based post-exploitation tool that can maintain persistence on a compromised system and run PowerShell agents without the need for powershell.exe? Empire Veil Patator Security Onion Explanation…
Which vulnerability scanner tool offers a cloud-based service that performs continuous monitoring, vulnerability management, and compliance checking? w3af Nikto SQLmap Qualys Explanation & Hint: Qualys is a security company that…
Which popular Linux penetration testing distribution is based on Debian GNU/Linux and has evolved from WHoppiX, WHAX, and BackTrack? Kali Linux Parrot OS BlackArch Linux Security Onion Explanation & Hint:…
What is a command-line tool that allows for interactive or non-interactive command execution? Bash Kali Linux Parrot OS Metasploit Explanation & Hint: The Bourne-Again shell (Bash) is a command-line shell…
Which passive reconnaissance tool can be used to find information about devices and networks on the Internet? Recon-ng Maltego Censys theHarvester Explanation & Hint: Censys is a tool that can…
Which programming language element is a code template that includes initial variables and functions for creating an object? Class Function Array Procedure Explanation & Hint: A class is a code…
Which tool organizes query entities within the Entity Palette and calls the search options "transforms"? Shodan FOCA Maltego theHarvester Explanation & Hint: Maltego is a tool for passive reconnaissance that…
Which programming language element is a block of code that can be reused multiple times to execute a specific task? Function JavaScript Object Notation (JSON) Array Class Explanation & Hint:…
Which tool is designed to find metadata and hidden information in documents? theHarvester FOCA ExifTool Shodan Explanation & Hint: Fingerprinting Organization with Collected Archives (FOCA) is a tool designed to…
Which Linux distribution comes with more than 1900 security penetration testing tools? BlackArch Linux Parrot OS Kali Linux BackTrack Explanation & Hint: BlackArch Linux is a Linux distribution with over…
What are two tools that can be used to perform credential attacks? (Choose two.) Nslookup FOCA Mimikatz Censys Patator Explanation & Hint: Some of the most popular tools that can…
What are two tools that can be used to perform active reconnaissance? (Choose two.) Nslookup Zenmap Tor Enum4linux Maltego Explanation & Hint: Active reconnaissance involves gathering information about a victim…
Which domain name database query utility has been restricted by the European Union´s General Data Protection Regulation (GDPR) to protect privacy? Dig Whois FOCA theHarvester Explanation & Hint: Most Linux,…
What is the definition of a library in application software? It is a section of code that is created to perform a specific task. It is a collection of resources…