Question 46

Which Nmap switch helps evade IDS or firewalls?
  • Question 47

    When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?
  • Question 48

    A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine.
    Which of the following advanced operators would allow the pen tester to restrict the search to the organization's web domain?
  • Question 49

    While testing a web application in development, you notice that the web server does not properly ignore the "dot dot slash" (../) character string and instead returns the file listing of a folder structure of the server.
    What kind of attack is possible in this scenario?
  • Question 50

    Fingerprinting an Operating System helps a cracker because: