Verified
What does the -oX flag do in an Nmap scan?
A. Perform an express scan
B. Output the results in truncated format to the screen
C. Perform an Xmas scan
D. Output the results in XML format to a file - D. Output the results in XML format to a file
Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux
server occurring during non-business hours. After further
examination of all login activities, it is noticed that none of the logins have occurred during typical work
hours. A Linux administrator who is investigating this
problem realizes the system time on the Linux server is wrong by more than twelve hours. What
protocol used on Linux servers to synchronize the time has
stopped working?
A. Time Keeper
B. NTP
C. PPP
D. OSPP - B. NTP
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems,
he uses a detection method where the anti-virus executes
the malicious codes on a virtual machine to simulate CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
A. Heuristic Analysis
B. Code Emulation
C. Integrity checking
, D. Scanning - B. Code Emulation
If an attacker uses the command SELECT*FROM user WHERE name = 'x' AND userid IS NULL; --'; which
type of SQL injection attack is the attacker
performing?
A. End of Line Comment
B. UNION SQL Injection
C. Illegal/Logically Incorrect Query
D. Tautology - D. Tautology
Which of the following is considered as one of the most reliable forms of TCP scanning?
A. TCP Connect/Full Open Scan
B. Half-open Scan
C. NULL Scan
D. Xmas Scan - A. TCP Connect/Full Open Scan
Which of the following scanning method splits the TCP header into several packets and makes it difficult
for packet filters to detect the purpose of the packet?
A. ICMP Echo scanning
B. SYN/FIN scanning using IP fragments
C. ACK flag probe scanning
D. IPID scanning - B. SYN/FIN scanning using IP fragments
Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an
unsuspecting user's browser to send malicious requests they did not intend?
A. Command Injection Attacks