I2025IUpdate)IQsI&IAsI|IGradeIA|I100%I
CorrectI(VerifiedIAnswers)
Q:IAllen,IaIsecurityIprofessionalIinIanIorganization,IwasIsuspiciousIaboutItheIactivitiesIinIth
eInetworkIandIdecidedItoIscanIallItheIlogs.IInIthisIprocess,IheIusedIaItoolIthatIautomaticallyIc
ollectsIallItheIeventIlogsIfromIallItheIsystemsIpresentIinItheInetworkIandItransfersItheIreal-
timeIeventIlogsIfromItheInetworkIsystemsItoItheImainIdashboard.
WhichIofItheIfollowingItoolsIdidIAllenIemployIinItheIaboveIscenario?
Answer:
Splunk
Q:IWhichIassessmentIfocusesIonItransactionalIwebIapplications,ItraditionalIclient-
serverIapplications,IandIhybridIsystems?
Answer:
ApplicationIassessment
Q:IGivenIbelowIareItheIdifferentIphasesIinvolvedIinItheIwebIAPIIhackingImethodology.
1.IDetectIsecurityIstandards
2.IIdentifyItheItarget
3.ILaunchIattacks
4.IIdentifyItheIattackIsurface
WhatIisItheIcorrectIsequenceIofIphasesIfollowedIinItheIwebIAPIIhackingImethodology?
Answer:
2I1I4I3
,Q:IWhichIofItheIfollowingItechniquesIisIusedItoIgatherIinformationIaboutItheItargetIwithoutI
directIinteractionIwithItheItarget?
Answer:
PassiveIfootprinting
Q:INameIanIattackIwhereItheIattackerIconnectsItoInearbyIdevicesIandIexploitsItheIvulnerabil
itiesIofItheIBluetoothIprotocolItoIcompromiseItheIdevice?
AIRollingIcodeIattack
BIJammingIattack
CIDDoSIattack
DIBlueBorneIattack
Answer:
BlueBorneIattack
Q:IWhichIofItheIfollowingINmapIcommandsIisIusedIbyIanIattackerItoIperformIanIIPIprotoco
lIpingIscanIonIaItargetIdevice?
Answer:
#InmapI-snI-POI<targetIIPIaddress>
Q:IWhichIofItheIfollowingImethodsIallowsIusersItoIattainIprivilegedIcontrolIwithinIAndroid'
sIsubsystem,IresultingIinItheIexposureIofIsensitiveIdata?
Answer:
Rooting
,Q:IWhichIofItheIfollowingItoolsIisIusedIbyIanIattackerItoIdetermineItheIrelationshipsIandIre
al-worldIlinksIamongIpeople,Iorganizations,Iwebsites,IInternetIinfrastructure,IandIdocuments?
Answer:
Maltego
Q:IWhichIofItheIfollowingIGNUIradioItoolsIisIusedItoIcaptureIandIlistenItoIincomingIsignal
sIonIanIaudioIdevice?
Answer:
uhd_rx_nogui
Q:IWhichIofItheIfollowingIscanningItechniquesIusedIbyIattackersIinvolvesIresettingItheITCP
IconnectionIbetweenIaIclientIandIserverIabruptlyIbeforeItheIcompletionIofItheIthree-
wayIhandshakeIsignals?
Answer:
StealthIscan
Q:IDuringIaIpenetrationItest,IMarinIdiscoveredIaIsessionItokenIthatIhadIhadItheIcontent:I201
70801135433_Robert.IWhyIisIthisIsessionItokenIweak,IandIwhatIisItheInameIusedIforIthisItyp
eIofIvulnerability?
Answer:
PredictableISessionIToken
, Q:IWhichIofItheIfollowingIstaticImalwareIanalysisItechniquesIprovidesIinformationIaboutIth
eIbasicIfunctionalityIofIanyIprogramIandIisIalsoIusedItoIdetermineItheIharmfulIactionsIthatIaIp
rogramIcanIperform?
Answer:
MalwareIdisassemblyI?
Q:IInIwhichIofItheIfollowingItypesIofIinjectionIattackIdoesIanIattackerIinjectIcarriageIreturnI
(\r)IandIlinefeedI(\n)IcharactersIintoIuserIinputItoItrickIaIwebIserver,IwebIapplication,IorIuser?
Answer:
CRLFIinjection
Q:IEdward,IaIsecurityIprofessionalIinIanIorganization,IwasIinstructedIbyIhigherIofficialsItoIc
alculateItheIseverityIofItheIorganization'sIsystems.IInItheIprocess,IheIusedICVSS,IaIpublishedI
standardIthatIprovidesIanIopenIframeworkIforIcommunicatingItheIcharacteristicsIandIimpactsIo
fIITIvulnerabilities.IHeIusedIthreeImetricsIprovidedIbyICVSSIforImeasuringIvulnerabilities.
WhichIofItheIfollowingICVSSImetricsIrepresentsItheIfeaturesIthatIcontinueItoIchangeIduringIt
heIlifetimeIofItheIvulnerability?
Answer:
TemporalImetric
Q:IGarry,IaIsecurityIprofessionalIinIanIorganization,IrecentlyInoticedIthatIsomeoneIwasIremo
telyIcontrollingItheInetworkIdevicesIinItheIorganization.IAfterIthoroughIresearch,IheIfoundItha
tIanIattackerItookIadvantageIofISNMPIvulnerabilitiesItoIgainIaccessItoItheIsystems.
WhichIofItheIfollowingIcountermeasuresIshouldIGarryIfollowItoIsecureItheIorganizationIfromI
SNMPIenumeration?