email is transmitted across the internet using the smtp . it does notencrypt email, leaving the information in the message vulnerable to being read by an unauthorized person , SMTP can upgrade a comnnection between 2 mail servers to use TLS . Email transmitted by SMTP over tls is encrypted what is the name of the command uesed by SMTp to transmit email over TLS
OPPORTUNISTIC TLS
UPGRADE TLS
FOURE TLS
STARTTLS
SHOW ANSWERCompany's policy requires employees to perform file transfer using protocol which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes . you have positioned a network sniffer to capture traffic from the laptops used by the employees in the data ingest department. using wireshark to examine the capture traffic which command can be used as a display filter to find unencrypted file transfer?
Tcp.port !=21
Tcp.port ==21|| Tcp.port ==22
Tcp.port ==21
Tcp.port ==23
SHOW ANSWERWhat is the purpose of DNS AAAA record?
IPv6 address resolution records
address database record
Authorization, Authentication and auditing record
address prefix record
SHOW ANSWERLog monitoring tools performing behavioural analysis have alerts several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login actives its noticed that none of the logins have occurred during the typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than 12 hours. what protocol used on Linux servers to synchronize the time has stoped working?
Time keeper
OSPF
PPP
NTP SHOW ANSWERWhich of the following is NOT correct about the usefulness of vulnerability scanning.
Check compliance with host application usage and security policies
Provide
information on how to mitigate discovered vulnerabilities
Provide the environment to be able to safely penetrate vulnerable systems
Provide information on targets for penetration testing
SHOW ANSWERDarius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it’s true positive or false positive. Looking at the logs he copy and paste basic details like below
destination IP: 192.168.10.23
destination port: 63221
source IP: 192.168.21.100
source port: 80
This is most probably true positive which trigged on secure communication between client and sever.
This is most probably true negative
This is most probably false positive , bacasue an alert triggered on reversed traffic
This is most probably false positive , IDS is monitoring one direction traffic.
SHOW ANSWERWhen configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication “open”, but sets the SSID to a 32-character string of random letters and numbers. What is an accurate assessment of this scenario from a security perspective?
Disabling SSID broadcast prevents 802.11 beacons from being transmitted from the access point, resulting in a valid setup leveraging “security through obscurity”.
Since the SSID is required in order to connect, the 32-character string is sufficient to prevent brute-force attacks
Javik’s router is still vulnerable to wireless hacking attempts, because the SSID broadcast setting can be enabled using a specially crafted packet sent to the hardware address of the access point.
It is still possible for a hacker to connect to the network after sniffing the SSID from a successful wireless association.
SHOW ANSWERA pen tester is configuring a windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?
Winprom
Winpsw
Libpcap
Winpcap
SHOW ANSWERwhich of the below hashing functions are not recommended for used
SHA2, SHA3,
MD5, SHA 1SHA1 ECC
MD5, SHA5
SHOW ANSWERYou are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from the command line. Which command would you use?
c:\win...\ncpa.cpl
c:\win...\gpedit
c:\win...\compmgmt.msc
c:\win...\services.exedsd
SHOW ANSWERYour business has decided to add credit card numbers to the data it backs up to tape. Which of the following represents the best practice your business should observe?
Encrypt backup tapes that are sent off-site.
Do not back up either the credit card numbers or their hashes.
Back up the hashes of the credit card numbers, not the actual credit card numbers.ss
Hire a security consultant to provide direction.
SHOW ANSWERWhich of the following is a wireless network detector that is commonly found on Linux?
Kismet
Abel
Netstumbler
Nessus
SHOW ANSWERA security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?
Forensic attack
ARP spoofing attack
Social engineering attack
Scanning attack
SHOW ANSWERCode injection is a form of attack in which a malicious user:
Inserts text into a data field that gets interpreted as code
Gets the server to execute arbitrary code using a buffer overflow
Inserts additional code into the JavaScript running in the browser
Gains access to the codebase on the server and inserts new code
SHOW ANSWER