Question 26

Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions. Which of the following tools is he most likely using?
  • Question 27

    An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hacker's next step be before starting work on this job?
  • Question 28

    You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
    What may be the problem?
  • Question 29

    Which of the following is an example of IP spoofing?
  • Question 30

    The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below:
    You are hired to conduct security testing on their network.
    You successfully brute-force the SNMP community string using a SNMP crack tool.
    The access-list configured at the router prevents you from establishing a successful connection.
    You want to retrieve the Cisco configuration from the router. How would you proceed?