Our Blog

scan
Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the user who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization? Option 1 : Credential assessment Option 2 : Internal assessment Option 3 : External assessment Option 4 :
tools
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario? Option 1 :  VoIP footprinting Option 2 : Dark web footprinting Option 3 : Website footprinting Option
Scoring
In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in? Option 1 : 4.0-6.9 Option 2 : 3.9-6.9 Option 3 : 3.0-6.9 Option 4 : 4.0-6.0 The Common Vulnerability Scoring System (CVSS) is an open structure for conveying the attributes and seriousness of programming weaknesses. CVSS comprises of three measurement gatherings: Base, Temporal, and Environmental. The Base measurements produce a score going from 0 to 10, which would
protocol
Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup  a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic? Option 1 : RPC and the best practice is to disable RPC completely Option 2 :  SNMP and he should change it to SNMP
working
Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee username, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certifications. Which of the following protocols is used by Bella? Option 1 : HTTPS Option 2 : FTP Option 3
running
During the enumeration phase, Lawrence performs banner grabbing to obtain information such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445. Which of the following services is enumerated by Lawrence in this scenario? Option 1 : Telnet Option 2 : Network File System (NFS) Option 3 : Server Message Block (SMB) Option 4 : Remote procedure call (RPC) 1. Telnet Telnet is an organization convention
container
Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture is Abel currently

1 thought on “Samuel a security administrator, is accessing the configuration of a web server. He noticed that the server permits SSLv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attack as the SSLv2 server can leak key information. Which of the following attack can be performed by exploiting the above vulnerability?”

  1. ruth_charles

    I blog quite often and I genuinely thank you for your information. Your article has truly
    peaked my interest. I’m going to take a note of your site
    and keep checking for new information about once per week.

    I subscribed to your Feed too.

Leave a Comment