You want to perform banner grabbing against a machine (168.15.22.4) you suspect as being a web server. Assuming you have the correct tools installed, which of the following command-line entries will successfully perform a banner grab? (Choose all that apply)
A pen tester is configuring a Windows laptop for a test. In…
A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what driver and library are required to allow the NIC to work in promiscuous mode?
An SOA record gathered from a zone transfer is shown here:
An SOA record gathered from a zone transfer is shown here:
As a pen test team member, you begin searching for IP ranges…
As a pen test team member, you begin searching for IP ranges owned by the target organization and discover their network range. You also read job postings and news articles and visit the organization’s website. Throughout the first week of the test, you also observe when employees come to and leave work, and you rummage through the trash outside the building for useful information. Which type of footprinting are you accomplishing?
Brad has done some research and determined a certain set of…
Brad has done some research and determined a certain set of systems on his network fail once every ten years. The purchase price for each of these systems is $1200. Additionally, Brad discovers the administrators on staff, who earn $50 an hour, estimate five hours to replace a machine. Five employees, earning $25 an hour, depend on each system and will be completely unproductive while it is down. If you were to ask Brad for an ALE on these devices, what should he answer with?
Which is usually the best argument for a CISO not reporting…
Which is usually the best argument for a CISO not reporting to a CIO?
An IT leader who wants to build IT processes according to a…
An IT leader who wants to build IT processes according to a standard model should adopt which standard?
What is the essential minimum practice for administering sec…
What is the essential minimum practice for administering security awareness training?
An auditor is performing a walkthrough of a server environme…
An auditor is performing a walkthrough of a server environment. Regarding a set of production servers, the systems engineer has told the auditor that the systems are operating in an “active-active” configuration. What can the auditor conclude from this?
A method where the first personnel involved in a disaster be…
A method where the first personnel involved in a disaster begin notifying others in the organization to inform them of the developing disaster and to enlist their assistance is called a: