What does the MFP feature in the 802.11w standard do to protect against wireless attacks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What does the MFP feature in the 802.11w standard do to protect against wireless attacks? It uses a PNL to maintain a list of trusted or preferred wireless networks. It…

Continue ReadingWhat does the MFP feature in the 802.11w standard do to protect against wireless attacks?

Which Wi-Fi protocol is most vulnerable to a brute-force attack during a Wi-Fi network deployment?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Wi-Fi protocol is most vulnerable to a brute-force attack during a Wi-Fi network deployment? WPA2-EAP WPS WPA3 WPA2-TKIP Explanation & Hint: Wi-Fi Protected Setup (WPS) is a protocol that…

Continue ReadingWhich Wi-Fi protocol is most vulnerable to a brute-force attack during a Wi-Fi network deployment?

Which tool can be used to perform a Disassociation attack?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which tool can be used to perform a Disassociation attack? Airmon-ng nmap POODLE EMPIRE Explanation & Hint: Airmon-ng (part of the Aircrack-ng suite) can perform wireless reconnaissance and disassociation attacks.…

Continue ReadingWhich tool can be used to perform a Disassociation attack?

Which two best practices would help mitigate FTP server abuse and attacks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two best practices would help mitigate FTP server abuse and attacks? (Choose two.) limit anonymous logins to a select group of people edit the hosts file to limit the…

Continue ReadingWhich two best practices would help mitigate FTP server abuse and attacks? (Choose two.)

Which Kali Linux tool or script can gather information on devices configured for SNMP?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Kali Linux tool or script can gather information on devices configured for SNMP? snmp-check nslookup snmp-brute.nse snmp-netstat.nse Explanation & Hint: The Kali Linux snmp-check tool can perform an SNMP…

Continue ReadingWhich Kali Linux tool or script can gather information on devices configured for SNMP?

What two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.) randomization of ports provision of cryptographically secure DNS…

Continue ReadingWhat two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.)

Match the port type and number with the respective NetBIOS protocol service.

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the port type and number with the respective NetBIOS protocol service. UDP port 138 ==> NetBIOS Datagram Service UDP port 137 ==> NetBIOS Name Service TCP port 445 ==>…

Continue ReadingMatch the port type and number with the respective NetBIOS protocol service.

Which NetBIOS service is used for connection-oriented communication?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which NetBIOS service is used for connection-oriented communication? NetBIOS-NS  NetBIOS-DGM  NetBIOS-SSN  LLMNR Explanation & Hint: NetBIOS provides three different services: NetBIOS Name Service (NetBIOS-NS) for name registration and resolution Datagram…

Continue ReadingWhich NetBIOS service is used for connection-oriented communication?

A user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive? throw the pen drive away deliver the pen…

Continue ReadingA user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive?

A new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new employee unknowingly enabled?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new…

Continue ReadingA new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new employee unknowingly enabled?

Which tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell? BeEF SET Nessus Nikto Explanation & Hint: Social Engineer Toolkit (SET) is a tool that…

Continue ReadingWhich tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell?