KillTestThe safer , easier way to help you pass any IT exams.8/ 18D. Denial-of-service Answer:A
20.Alisa is a Network Security Manager at Aidos Cyber Security. During a regular network audit, she sent specially crafted ICMP packet fragments with different offset values into the network, causing a system crash. Which attack Alisa is trying to perform?
21.Which of the following roles of Microsoft Windows Active Directory refers to the ability of an active directory to transfer roles to any domain controller (DC) in the enterprise?
22.A user unknowingly installed a fake malicious banking app in his Android mobile. This app includes a configuration file that consists of phone numbers of the bank. When the user makes a call to the bank, he is automatically redirected to the number being used by the attacker. The attacker impersonates as a banking official. Also, the app allows the attacker to call the user, then the app displays fake caller ID on the user’s mobile resembling call from a legitimate bank. Identify the attack being performed on the Android mobile user?
23.How does OS Fingerprinting help you as a pen tester?
A. It defines exactly what software the target has installed B. It doesn’t depend on the patches that have been applied to fix existing security holesC. It opens a security-delayed window based on the port being scanned D. It helps to research vulnerabilities that you can use to exploit on a target system