Q: 1
An attacker used the ping-of-death (PoD) technique to crash a target Android device. The network
traffic was captured by the SOC team and was provided to you to perform a detailed analysis.
Analyze the android.pcapng file located In the Documents folder of the Attacker machine-2 and
determine the length of PoD packets In bytes. (Practical Question)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Maisie. a new employee at an organization, was given an access badge with access to only the first
and third floors of the organizational premises. Maisie Hied scanning her access badge against the
badge reader at the second-floor entrance but was unsuccessful. Identify the short-range wireless
communication technology used by the organization in this scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their
corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS
solution that first creates models for possible intrusions and then compares these models with
incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Andre, a security professional, was tasked with segregating the employees' names, phone numbers,
and credit card numbers before sharing the database with clients. For this purpose, he implemented
a deidentification technique that can replace the critical information in database fields with special
characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Richard, a professional hacker, was hired by a marketer to gather sensitive data and information
about the offline activities of users from location dat
a. Richard employed a technique to determine the proximity of a user's mobile device to an exact
location using CPS features. Using this technique. Richard placed a virtual barrier positioned at a
static location to interact with mobile users crossing the barrier, identify the technique employed by
Richard in this scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Tenda, a network specialist at an organization, was examining logged data using Windows Event
Viewer to identify attempted or successful unauthorized activities. The logs analyzed by Tenda
include events related to Windows security; specifically, log-on/log-off activities, resource access,
and also information based on Windows system's audit policies.
Identify the type of event logs analyzed by Tenda in the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Desmond, a forensic officer, was investigating a compromised machine involved in various online
attacks. For this purpose. Desmond employed a forensic tool to extract and analyze computer-based
evidence to retrieve information related to websites accessed from the victim machine. Identify the
computer-created evidence retrieved by Desmond in this scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Tristan, a professional penetration tester, was recruited by an organization to test its network
infrastructure. The organization wanted to understand its current security posture and its strength in
defending against external threats. For this purpose, the organization did not provide any
information about their IT infrastructure to Tristan. Thus, Tristan initiated zero-knowledge attacks,
with no information or assistance from the organization.
Which of the following types of penetration testing has Tristan initiated in the above scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
The IH&R team in an organization was handling a recent malware attack on one of the hosts
connected to the organization's network. Edwin, a member of the IH&R team, was involved in
reinstating lost data from the backup medi
a. Before performing this step, Edwin ensured that the backup does not have any traces of malware.
Identify the IH&R step performed by Edwin in the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
The
SOC
department
in
a
multinational
organization
has
collected
logs
of a
security
event
as
"Windows.events.evtx". Study the Audit Failure logs in the event log file located in the Documents
folder of the
-Attacker Maehine-1" and determine the IP address of the attacker. (Note: The event ID of Audit
failure logs is
4625.)
(Practical Question)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2