Question 116
Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'.
What technique is Ricardo using?
What technique is Ricardo using?
Question 117
Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)
Question 118
A security engineer is attempting to map a company's internal network. The engineer enters in the following NMAP command:
NMAP -n -sS -P0 -p 80 ***.***.**.**
What type of scan is this?
NMAP -n -sS -P0 -p 80 ***.***.**.**
What type of scan is this?
Question 119
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Question 120
When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?
