Match the mobile device security testing tool to the description.

Match the mobile device security testing tool to the description. Drozer ==> This Android testing platform and framework provides access to numerous exploits that can be used to attack Android platforms.…

Comments Off on Match the mobile device security testing tool to the description.

Match the cloud attack to the description.

Match the cloud attack to the description. Credential Harvesting ==> Act of gathering and stealing valid usernames, passwords, tokens, PINs, and any other types of credentials through infrastructure breaches Account Takeover…

Comments Off on Match the cloud attack to the description.

A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director and wants the help desk to change the password. What method of influence is this cybercriminal using?

A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director…

Comments Off on A threat actor spoofed the phone number of the director of HR and called the IT help desk with a login problem. The threat actor claims to be the director and wants the help desk to change the password. What method of influence is this cybercriminal using?

A penetration tester runs the command nmap -sF -p 80 192.168.1.1 against a Windows host and receives a response RST packet. What conclusion can be drawn on the status of port 80?

A penetration tester runs the command nmap -sF -p 80 192.168.1.1 against a Windows host and receives a response RST packet. What conclusion can be drawn on the status of…

Comments Off on A penetration tester runs the command nmap -sF -p 80 192.168.1.1 against a Windows host and receives a response RST packet. What conclusion can be drawn on the status of port 80?

A company conducted a penetration test 6 months ago. However, they have acquired new firewalls and servers to strengthen the network and increase capacity. Why would an administrator request a new penetration test?

A company conducted a penetration test 6 months ago. However, they have acquired new firewalls and servers to strengthen the network and increase capacity. Why would an administrator request a…

Comments Off on A company conducted a penetration test 6 months ago. However, they have acquired new firewalls and servers to strengthen the network and increase capacity. Why would an administrator request a new penetration test?

Which are two best practices used to secure APIs? (Choose two.)

Which are two best practices used to secure APIs? (Choose two.) use reputable and standard libraries to create the APIs make internal API documentation mandatory keep API implementation and API…

Comments Off on Which are two best practices used to secure APIs? (Choose two.)

Which functionality is provided by DHCP?

Which functionality is provided by DHCP? automatic assignment of an IP address to each host remote switch management end-to-end connectivity test translation of IP addresses to domain names Explanation &…

Comments Off on Which functionality is provided by DHCP?

Why would a technician enter the command copy startup-config running-config?

Why would a technician enter the command copy startup-config running-config? to remove all configurations from the switch to make a changed configuration the new startup configuration to save an active configuration…

Comments Off on Why would a technician enter the command copy startup-config running-config?

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? Reload…

Comments Off on An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

What is the function of the shell in an OS?

What is the function of the shell in an OS? It provides dedicated firewall services. It interacts with the device hardware. It interfaces between the users and the kernel. It…

Comments Off on What is the function of the shell in an OS?

What is the default SVI on a Cisco switch?

What is the default SVI on a Cisco switch? VLAN100 VLAN99 VLAN999 VLAN1 Explanation & Hint: Layer 2 switches use switch virtual interfaces (SVIs) to provide a means for remote…

Comments Off on What is the default SVI on a Cisco switch?

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a…

Comments Off on An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?