Which two best practices would help mitigate FTP server abuse and attacks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two best practices would help mitigate FTP server abuse and attacks? (Choose two.) limit anonymous logins to a select group of people edit the hosts file to limit the…

Continue ReadingWhich two best practices would help mitigate FTP server abuse and attacks? (Choose two.)

Which Kali Linux tool or script can gather information on devices configured for SNMP?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Kali Linux tool or script can gather information on devices configured for SNMP? snmp-check nslookup snmp-brute.nse snmp-netstat.nse Explanation & Hint: The Kali Linux snmp-check tool can perform an SNMP…

Continue ReadingWhich Kali Linux tool or script can gather information on devices configured for SNMP?

What two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.) randomization of ports provision of cryptographically secure DNS…

Continue ReadingWhat two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.)

Match the port type and number with the respective NetBIOS protocol service.

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the port type and number with the respective NetBIOS protocol service. UDP port 138 ==> NetBIOS Datagram Service UDP port 137 ==> NetBIOS Name Service TCP port 445 ==>…

Continue ReadingMatch the port type and number with the respective NetBIOS protocol service.

Which NetBIOS service is used for connection-oriented communication?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which NetBIOS service is used for connection-oriented communication? NetBIOS-NS  NetBIOS-DGM  NetBIOS-SSN  LLMNR Explanation & Hint: NetBIOS provides three different services: NetBIOS Name Service (NetBIOS-NS) for name registration and resolution Datagram…

Continue ReadingWhich NetBIOS service is used for connection-oriented communication?

A user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive? throw the pen drive away deliver the pen…

Continue ReadingA user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive?

A new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new employee unknowingly enabled?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new…

Continue ReadingA new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new employee unknowingly enabled?

Which tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell? BeEF SET Nessus Nikto Explanation & Hint: Social Engineer Toolkit (SET) is a tool that…

Continue ReadingWhich tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell?

A threat actor has sent a text message to a victim stating that they have won bitcoins in a bank contest. To claim their prize, the victim must click the provided link and enter their bank account information. What social engineering attack can be accomplished if the user enters their banking information?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A threat actor has sent a text message to a victim stating that they have won bitcoins in a bank contest. To claim their prize, the victim must click the…

Continue ReadingA threat actor has sent a text message to a victim stating that they have won bitcoins in a bank contest. To claim their prize, the victim must click the provided link and enter their bank account information. What social engineering attack can be accomplished if the user enters their banking information?

Which Apple iOS and Android tools can spoof a phone number, record calls, and generate different background noises?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Apple iOS and Android tools can spoof a phone number, record calls, and generate different background noises? Nessus Asterisk SpoofCard BeEF Explanation & Hint: Several call spoofing tools can…

Continue ReadingWhich Apple iOS and Android tools can spoof a phone number, record calls, and generate different background noises?

Which tool can launch social engineering attacks and be integrated with third-party tools and frameworks such as Metasploit?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which tool can launch social engineering attacks and be integrated with third-party tools and frameworks such as Metasploit? BeEF Nessus SET Asterisk Explanation & Hint: Social-Engineer Toolkit (SET) is a…

Continue ReadingWhich tool can launch social engineering attacks and be integrated with third-party tools and frameworks such as Metasploit?