- (Topic 2)
Consider the following Nmap output:
what command-line parameter could you use to determine the type and version number of the web server?
Correct Answer:A
C:\Users\moi>nmap -h | findstr " -sV" -sV: Probe open ports to determine service/version info
- (Topic 3)
Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?
Correct Answer:C
- (Topic 3)
Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?
Correct Answer:B
related:This operator displays websites that are similar or related to the URL specified.
- (Topic 3)
What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?
Correct Answer:B
-q, --quiet quiet (no output)
-S, --server-response print server response
- (Topic 1)
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?
Correct Answer:B
- (Topic 2)
These hackers have limited or no training and know how to use only basic techniques or tools.
What kind of hackers are we talking about?
Correct Answer:B
Script Kiddies: These hackers have limited or no training and know how to use only basictechniques or tools. Even then they may not understand any or all of what they are doing.