Question 21

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?
  • Question 22

    Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
  • Question 23

    Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process.
    Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
    What is the attack performed by Robin in the above scenario?
  • Question 24

    Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?
  • Question 25

    Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their service and wanted to move to another CSP.
    What part of the contract might prevent him from doing so?