312-50v13
Free trial
Verified
Question 1
In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
- A: IDEA
- B: Triple Data Encryption Standard
- C: AES
- D: MD5 encryption algorithm
Question 2
You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?
- A: Reconnaissance
- B: Weaponization
- C: Command and control
- D: Exploitation
Question 3
Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is the tool employed by James in the above scenario?
- A: ophcrack
- B: VisualRoute
- C: Hootsuite
- D: HULK
Question 4
Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.
- A: Bryan’s public key; Bryan’s public key
- B: Alice’s public key; Alice’s public key
- C: Bryan’s private key; Alice’s public key
- D: Bryan’s public key; Alice’s public key
Question 5
What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?
- A: AndroidManifest.xml
- B: classes.dex
- C: APK.info
- D: resources.asrc
Question 6
Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives.
What is the tool employed by Mason in the above scenario?
- A: NetPass.exe
- B: Outlook scraper
- C: WebBrowserPassView
- D: Credential enumerator
Question 7
Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?
- A: Bluesmacking
- B: Bluesnarfing
- C: Bluejacking
- D: Bluebugging
Question 8
While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, “Learn more about your friends!”, as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions on the post. A few days later, Matt’s bank account has been accessed, and the password has been changed.
What most likely happened?
- A: Matt inadvertently provided the answers to his security questions when responding to the post.
- B: Matt inadvertently provided his password when responding to the post.
- C: Matt’s computer was infected with a keylogger.
- D: Matt’s bank account login information was brute forced.
Question 9
Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks.
What is the type of attack performed by Simon?
- A: Combinator attack
- B: Dictionary attack
- C: Rainbow table attack
- D: Internal monologue attack
Question 10
Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve’s profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company.
What is the social engineering technique Steve employed in the above scenario?
- A: Baiting
- B: Piggybacking
- C: Diversion theft
- D: Honey trap
Question 11
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?
- A: Exploration
- B: Investigation
- C: Reconnaissance
- D: Enumeration
Question 12
Attacker Lauren has gained the credentials of an organization’s internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?
- A: Incident triage
- B: Preparation
- C: Incident recording and assignment
- D: Eradication
Question 13
While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?
- A: -sA
- B: -sX
- C: -sT
- D: -sF
Question 14
At what stage of the cyber kill chain theory model does data exfiltration occur?
- A: Weaponization
- B: Actions on objectives
- C: Command and control
- D: Installation
Question 15
Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson’s machine.
What is the social engineering technique Steve employed in the above scenario?
- A: Diversion theft
- B: Quid pro quo
- C: Elicitation
- D: Phishing
Question 16
An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks.
Which of the following security scanners will help John perform the above task?
- A: AlienVault® OSSIMTM
- B: Syhunt Hybrid
- C: Saleae Logic Analyzer
- D: Cisco ASA
Question 17
Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?
- A: getsystem
- B: getuid
- C: keylogrecorder
- D: autoroute
Question 18
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?
- A: Xmas scan
- B: IDLE/IPID header scan
- C: TCP Maimon scan
- D: ACK flag probe scan
Question 19
An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization decided to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware.
Which of the following tools must the organization employ to protect its critical infrastructure?
- A: Robotium
- B: BalenaCloud
- C: Flowmon
- D: IntentFuzzer
Question 20
Heather’s company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring.
Which of the following is this type of solution?
- A: IaaS
- B: SaaS
- C: PaaS
- D: CaaS
Question 21
Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization's magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures, and memes.
Which of the following footprinting techniques did Rachel use to finish her task?
- A: Google advanced search
- B: Meta search engines
- C: Reverse image search
- D: Advanced image search
Question 22
Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes.
Which type of attack can she implement in order to continue?
- A: Pass the hash
- B: Internal monologue attack
- C: LLMNR/NBT-NS poisoning
- D: Pass the ticket
Question 23
Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?
- A: Credentialed assessment
- B: Internal assessment
- C: External assessment
- D: Passive assessment
Question 24
A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
What is the type of vulnerability assessment performed by Martin?
- A: Database assessment
- B: Host-based assessment
- C: Credentialed assessment
- D: Distributed assessment
Question 25
Which of the following protocols can be used to secure an LDAP service against anonymous queries?
- A: NTLM
- B: RADIUS
- C: WPA
- D: SSO
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!