John can go to Archiveorg to see past versions of the company website Correct

John can go to archiveorg to see past versions of the

This preview shows page 30 - 33 out of 49 pages.

D. John can go to Archive.org to see past versions of the company website Correct Answer: D Section: (none) Explanation Explanation/Reference: - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Image of page 30
QUESTION 93HDC Networks Ltd. is a leading security services company. Matthew works as a penetrating tester with this firm. He was asked to gather information about the target company. Matthew begins with social engineering by following the steps: I. Secretly observes the target to gain critical information II. Looks at employee’s password or PIN code with the help of binoculars or a low-power telescope Based on the above description, identify the information gathering technique. B Section: (none) Explanation Explanation/Reference: QUESTION 94 Analyze the packet capture from Wireshark below and mark the correct statement. A. It is an invalid DNS query B. It is a DNS response message C. It is an answer to the iterative query from Microsoft.com DNS server D. It is Host (A record) DNS query message - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Image of page 31
D Explanation Explanation/Reference: QUESTION 95Sarah is a pen tester at JK Hopes & Sons based in Las Vegas. As a part of the penetration testing, she was asked to perform the test without exposing the test to anyone else in the organization. Only a few people in the organization know about the test. This test covers the organization’s security monitoring, incident identification and its response procedures. What kind of pen testing is Sarah performing? C Section: (none) Explanation Explanation/Reference: QUESTION 96Henderson has completed the pen testing tasks. He is now compiling the final report for the client. Henderson needs to include the result of scanning that revealed a SQL injection vulnerability and different SQL queries that he used to bypass web application authentication. In which section of the pen testing report, should Henderson include this information? C Section: (none) Explanation Explanation/Reference:
Image of page 32
Image of page 33

You've reached the end of your free preview.

Want to read all 49 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture