Identify the type of attack performed by Thomas on the online shopping website

Identify the type of attack performed by thomas on

This preview shows page 4 - 6 out of 20 pages.

Identify the type of attack performed by Thomas on the online shopping website? A. Session poisoning attack B. Hidden field manipulation attack C. HTML embedding attack D. XML external entity attack Answer:C 6.Steven is performing a wireless network audit. As part of the engagement, he is trying to crack a WPA-PSK key. Steven has captured enough packets to run aircrack-ng and discover the key, but aircrack-ng did not yield any result, as there were no authentication packets in the capture. Which of the following commands should Steven use to generate authentication packets? 7.Sam was asked to conduct penetration tests on one of the client’s internal networks. As part of the testing process, Sam performed enumeration to gain information about computers belonging to a domain, list of shares on the individual hosts in the network, policies and passwords. Identify the enumeration technique. 8.Jason is working on a pen testing assignment. He is sending customized ICMP packets to a host in the target network. However, the ping requests to the target failed with “ICMP Time Exceeded Type = 11” error messages. What can Jason do to overcome this error? 9.Joseph, a penetration tester, was hired by Xsecurity Services. Joseph was asked to perform a pen test on a client’s network. He was not provided with any information about the client organization except the company name.
Background image
KillTestThe safer , easier way to help you pass any IT exams.4/ 18Identify the type of testing Joseph is going to perform for the client organization? A. White-box Penetration Testing B. Black-box Penetration Testing C. Announced Testing D. Grey-box Penetration Testing Answer:B 10.An organization deployed Microsoft Azure cloud services for running their business activities. They appointed Jamie, a security analyst for performing cloud penetration testing. Microsoft prohibits certain tests to be carried out on their platform. Which of the following penetration testing activities Jamie cannot perform on the Microsoft Azure cloud service?
Background image
Image of page 6

You've reached the end of your free preview.

Want to read all 20 pages?

  • Winter '19
  • Ram Rogg
  • Computer Security, Test, EC-council, Denial-of-service attack, Penetration test, Ecsav10 Practice Test, ECSA Certification, ECSAv10

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture