لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
While reviewing traffic from a tcpdump capture, you notice the following commands being sent from a remote system to one of your web servers:C:\>sc winternet.host.com create ncservicebinpath- "c:\tools\ncexe -I -p 2222 -e cmd.exe"C:\>sc vJnternet.host.com query ncservice.What is the intent of the commands?
A. he first command creates a backdoor shell as a service
B. he first command creates a backdoor shell as a service
C. his creates a service called ncservice which is linked to the cmd
D. he first command verifies the service is created and its status
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?
A. ncinject/find
B. ncinject/reverse
C. ncinject/reverse-http
D. ncinject /bind
عرض الإجابة
اجابة صحيحة: B
السؤال #3
You have gained shell on a Windows host and want to find other machines to pivot to, but the rules of engagement state that you can only use tools that are already available. How could you find other machines on the target network?
A. se the "ping" utility to automatically discover other hosts
B. se the "ping" utility in a for loop to sweep the network
C. se the "edit" utility to read the target's HOSTS file
D. se the "net share" utility to see who is connected to local shared drives
عرض الإجابة
اجابة صحيحة: B
السؤال #4
What is the MOST important document to obtain before beginning any penetration testing?
A. roject plan
B. xceptions document
C. roject contact list
D. written statement of permission
عرض الإجابة
اجابة صحيحة: A
السؤال #5
ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch at Tokyo and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel they can use?
A.
B.
C. 0
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which of the following best describes a client side exploit?
A. ttack of a client application that retrieves content from the network
B. ttack that escalates user privileged to root or administrator
C. ttack of a service listening on a client system
D. ttack on the physical machine
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following TCP packet sequences are common during a SYN (or half-open) scan?
A. ,B and C
B. and C
C. and D
D. and D
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?
A. se the http service's PUT command to push the file onto the target machine
B. se the scp service, protocol SSHv2 to pull the file onto the target machine
C. se the telnet service's ECHO option to pull the file onto the target machine
D. se the ftp service in passive mode to push the file onto the target machine
عرض الإجابة
اجابة صحيحة: D
السؤال #9
What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?
A. ethodology
B. onclusions
C. xecutive Summary
D. indings
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?
A. ne-way, the client challenges the access point
B. ne-way, the access point challenges the client
C. o challenges occur (or wireless connection
D. wo-way, both the client and the access point challenge each other
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: