SlideShare a Scribd company logo
An attacker has sent an email where the victim navigates to a malicious web page that has been
set up to look official. What is this called?
Question options:
Baiting
Pharming
Malvertising
Phishing
Spamming
A security professional is checking for domains based on certificates that are no longer allowed.
What could they check for this?
Question options:
SET
ncpa.cpl
CRL
SAN
CRT
A security analyst is trying to find older versions of a company's website which contained
sensitive information. They are worried that attackers might still be able to find older versions,
so they want to try using web search commands. Which web search command would help them
search?
Question options:
site
:search
cache
inurl
inanchor
A penetration tester is working on a project and sees a fairly recent VoIP vulnerability has come
out. Which of the following records would best help them narrow down potential targets?
Question options:
NS
MX
SOA
SRV
TXT
A penetration tester is trying to use Google Hacking to find more instances of Cisco
CallManager. What should they use?
Question options:
intitle:"DPH" "web login setting"
intitle:"Grandstream Device Configuration" password
inurl:"ccmuser/logon.asp"
inurl:"CallManager"
A team is conducting a physical assessment and uses a simple mechanism such as Styrofoam to
bypass a certain control. Which control are they likely bypassing?
Question options:
Flood lights
Security badges
Locks
Motion sensor
Fences
The Social Engineering Toolkit is being employed for a targeted attack towards personnel.
Which of the following can SET NOT do?
Question options:
Reverse shells
PowerShell attacks
Scaling
Mass mail attacks
Infectious media
A security professional is looking for an organization's code that might have been posted
publicly by developers. Which of the following sources is least likely to contain accidental posts
by a company's developers?
Question options:
Github
CloudForge
Red dit
Bitbucker
theWayBackMachine
A social engineer is communicating, whether directly or indirectly, a lie or half-truth in order to
get someone to believe a falsehood. What is this tactic called?
Question options:
Pharming
Elicitation
Hoax
Phishing
Pretexting
A security professional is looking for interesting targets on a public-facing web server. What
would show them areas of the server that are not supposed to be crawled?
Question options:
Subject alternative name
Robots
Revocation list
DNS
Secret
A penetration tester is conducting a test against external-facing websites. Which of the following
tools is specifically geared towards website enumeration?
Question options:
Nmap
SET
WIGLE
dirbuster
OpenVAS
A penetration tester wants to gather email information for a targeted phishing campaign. Which
of the following tools could they use to collect this?
Question options:
Shodan
Metagoofil
Dirbuster
Nmap
theHarvester
During a penetration testing engagement, one of the team members presents a fictitious situation
as real. What is this tactic called?
Question options:
Elicitation
Phishing
Hoax
Pretexting
A penetration tester is conducting an OSINT reconnaissance against key employees to try to find
avenues into the network and notice that they belong to specific communities. Which of the
following would MOST likely help them target these niche areas?
Question options:
Twitter
Red dit
LinkedIn
Instagram
Facebook
Pintrest
A security consultant is attempting to look for default passwords for a client's D-Link phones.
Which of the following should they use?
Question options:
intitle:"DPH" "web login setting"
intitle:"Grandstream Device Configuration" password
D.inurl:"CallManager"
inurl:"ccmuser/logon.asp"
intitle:"*" default password
Baiting
Pharming
Malvertising
Phishing
Spamming

More Related Content

Similar to An attacker has sent an email where the victim navigates to a maliciou.pdf

INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri
 
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docxLab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
LaticiaGrissomzz
 
BSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPointBSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPoint
Andrew McNicol
 
BSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPointBSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPoint
Andrew McNicol
 
Robin has just been hired as a security engineer and wants t.pdf
Robin has just been hired as a security engineer and wants t.pdfRobin has just been hired as a security engineer and wants t.pdf
Robin has just been hired as a security engineer and wants t.pdf
iconsystemsslm
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
LaticiaGrissomzz
 
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Amazon Web Services
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
Chris Gates
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
David Hunt
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
Novetta
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionDaniel Liu
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
Christian Martorella
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
ijtsrd
 
Hunting the Evil of your Infrastructure
Hunting the Evil of your InfrastructureHunting the Evil of your Infrastructure
Hunting the Evil of your Infrastructure
A. S. M. Shamim Reza
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet

Similar to An attacker has sent an email where the victim navigates to a maliciou.pdf (20)

INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docxLab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
 
BSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPointBSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPoint
 
BSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPointBSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPoint
 
Robin has just been hired as a security engineer and wants t.pdf
Robin has just been hired as a security engineer and wants t.pdfRobin has just been hired as a security engineer and wants t.pdf
Robin has just been hired as a security engineer and wants t.pdf
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
Hunting the Evil of your Infrastructure
Hunting the Evil of your InfrastructureHunting the Evil of your Infrastructure
Hunting the Evil of your Infrastructure
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 

More from Stewart9OZBondc

Based on the image below- suggest FOUR (4) communication improvements.pdf
Based on the image below- suggest FOUR (4) communication improvements.pdfBased on the image below- suggest FOUR (4) communication improvements.pdf
Based on the image below- suggest FOUR (4) communication improvements.pdf
Stewart9OZBondc
 
BBB Ine has the following balance sheet and income statement data a- 1.pdf
BBB Ine has the following balance sheet and income statement data a- 1.pdfBBB Ine has the following balance sheet and income statement data a- 1.pdf
BBB Ine has the following balance sheet and income statement data a- 1.pdf
Stewart9OZBondc
 
Banks and its challenges after the COVID-19 pandemic- In this paper yo.pdf
Banks and its challenges after the COVID-19 pandemic- In this paper yo.pdfBanks and its challenges after the COVID-19 pandemic- In this paper yo.pdf
Banks and its challenges after the COVID-19 pandemic- In this paper yo.pdf
Stewart9OZBondc
 
Baseball Team Batting Averages Team batting averages for major league.pdf
Baseball Team Batting Averages Team batting averages for major league.pdfBaseball Team Batting Averages Team batting averages for major league.pdf
Baseball Team Batting Averages Team batting averages for major league.pdf
Stewart9OZBondc
 
Balance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdf
Balance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdfBalance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdf
Balance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdf
Stewart9OZBondc
 
Balance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdf
Balance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdfBalance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdf
Balance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdf
Stewart9OZBondc
 
As discussed in the book- what are two things the Federal Reserve does.pdf
As discussed in the book- what are two things the Federal Reserve does.pdfAs discussed in the book- what are two things the Federal Reserve does.pdf
As discussed in the book- what are two things the Federal Reserve does.pdf
Stewart9OZBondc
 
Background- Marfan syndrome is an autosomal dominant trait that leads.pdf
Background- Marfan syndrome is an autosomal dominant trait that leads.pdfBackground- Marfan syndrome is an autosomal dominant trait that leads.pdf
Background- Marfan syndrome is an autosomal dominant trait that leads.pdf
Stewart9OZBondc
 
B) prepare the entry for the security sale on April 17- 2021- Calculat.pdf
B) prepare the entry for the security sale on April 17- 2021- Calculat.pdfB) prepare the entry for the security sale on April 17- 2021- Calculat.pdf
B) prepare the entry for the security sale on April 17- 2021- Calculat.pdf
Stewart9OZBondc
 
Arandom sampie of 42 earthquakres that have occurred between danuary 2.pdf
Arandom sampie of 42 earthquakres that have occurred between danuary 2.pdfArandom sampie of 42 earthquakres that have occurred between danuary 2.pdf
Arandom sampie of 42 earthquakres that have occurred between danuary 2.pdf
Stewart9OZBondc
 
As a member of a team of subject matter experts in the management of e.pdf
As a member of a team of subject matter experts in the management of e.pdfAs a member of a team of subject matter experts in the management of e.pdf
As a member of a team of subject matter experts in the management of e.pdf
Stewart9OZBondc
 
An example of an epigenetic regulation of gene expression is HDACs- W.pdf
An example of an epigenetic regulation of gene expression is HDACs-  W.pdfAn example of an epigenetic regulation of gene expression is HDACs-  W.pdf
An example of an epigenetic regulation of gene expression is HDACs- W.pdf
Stewart9OZBondc
 
An direct writing style is NOT used- Group of answer choices A-When.pdf
An direct writing style is NOT used-   Group of answer choices A-When.pdfAn direct writing style is NOT used-   Group of answer choices A-When.pdf
An direct writing style is NOT used- Group of answer choices A-When.pdf
Stewart9OZBondc
 
An E- coll cell is infected by a temperate phage- Which of the followi.pdf
An E- coll cell is infected by a temperate phage- Which of the followi.pdfAn E- coll cell is infected by a temperate phage- Which of the followi.pdf
An E- coll cell is infected by a temperate phage- Which of the followi.pdf
Stewart9OZBondc
 
An atom has a charge of +2- What does this mean about the relationship.pdf
An atom has a charge of +2- What does this mean about the relationship.pdfAn atom has a charge of +2- What does this mean about the relationship.pdf
An atom has a charge of +2- What does this mean about the relationship.pdf
Stewart9OZBondc
 
Alisha is proud to be able to send her daughter to university- Her dau.pdf
Alisha is proud to be able to send her daughter to university- Her dau.pdfAlisha is proud to be able to send her daughter to university- Her dau.pdf
Alisha is proud to be able to send her daughter to university- Her dau.pdf
Stewart9OZBondc
 
An actress has a probability of getting offered a job after a try-out.pdf
An actress has a probability of getting offered a job after a try-out.pdfAn actress has a probability of getting offered a job after a try-out.pdf
An actress has a probability of getting offered a job after a try-out.pdf
Stewart9OZBondc
 
An adininistrator in the IT-HR department needs access to a virtual ma.pdf
An adininistrator in the IT-HR department needs access to a virtual ma.pdfAn adininistrator in the IT-HR department needs access to a virtual ma.pdf
An adininistrator in the IT-HR department needs access to a virtual ma.pdf
Stewart9OZBondc
 
Age-specific mortality is defined as thenumber of individuals from the.pdf
Age-specific mortality is defined as thenumber of individuals from the.pdfAge-specific mortality is defined as thenumber of individuals from the.pdf
Age-specific mortality is defined as thenumber of individuals from the.pdf
Stewart9OZBondc
 
Alter your Rectangle class to include compareTo and make any other mod.pdf
Alter your Rectangle class to include compareTo and make any other mod.pdfAlter your Rectangle class to include compareTo and make any other mod.pdf
Alter your Rectangle class to include compareTo and make any other mod.pdf
Stewart9OZBondc
 

More from Stewart9OZBondc (20)

Based on the image below- suggest FOUR (4) communication improvements.pdf
Based on the image below- suggest FOUR (4) communication improvements.pdfBased on the image below- suggest FOUR (4) communication improvements.pdf
Based on the image below- suggest FOUR (4) communication improvements.pdf
 
BBB Ine has the following balance sheet and income statement data a- 1.pdf
BBB Ine has the following balance sheet and income statement data a- 1.pdfBBB Ine has the following balance sheet and income statement data a- 1.pdf
BBB Ine has the following balance sheet and income statement data a- 1.pdf
 
Banks and its challenges after the COVID-19 pandemic- In this paper yo.pdf
Banks and its challenges after the COVID-19 pandemic- In this paper yo.pdfBanks and its challenges after the COVID-19 pandemic- In this paper yo.pdf
Banks and its challenges after the COVID-19 pandemic- In this paper yo.pdf
 
Baseball Team Batting Averages Team batting averages for major league.pdf
Baseball Team Batting Averages Team batting averages for major league.pdfBaseball Team Batting Averages Team batting averages for major league.pdf
Baseball Team Batting Averages Team batting averages for major league.pdf
 
Balance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdf
Balance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdfBalance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdf
Balance Sheet XVZ Corporation December 31-2015 Cash $10-000 Marketable.pdf
 
Balance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdf
Balance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdfBalance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdf
Balance Sheet XYZ Corporation December 31- 2015 Cash Marketable securi.pdf
 
As discussed in the book- what are two things the Federal Reserve does.pdf
As discussed in the book- what are two things the Federal Reserve does.pdfAs discussed in the book- what are two things the Federal Reserve does.pdf
As discussed in the book- what are two things the Federal Reserve does.pdf
 
Background- Marfan syndrome is an autosomal dominant trait that leads.pdf
Background- Marfan syndrome is an autosomal dominant trait that leads.pdfBackground- Marfan syndrome is an autosomal dominant trait that leads.pdf
Background- Marfan syndrome is an autosomal dominant trait that leads.pdf
 
B) prepare the entry for the security sale on April 17- 2021- Calculat.pdf
B) prepare the entry for the security sale on April 17- 2021- Calculat.pdfB) prepare the entry for the security sale on April 17- 2021- Calculat.pdf
B) prepare the entry for the security sale on April 17- 2021- Calculat.pdf
 
Arandom sampie of 42 earthquakres that have occurred between danuary 2.pdf
Arandom sampie of 42 earthquakres that have occurred between danuary 2.pdfArandom sampie of 42 earthquakres that have occurred between danuary 2.pdf
Arandom sampie of 42 earthquakres that have occurred between danuary 2.pdf
 
As a member of a team of subject matter experts in the management of e.pdf
As a member of a team of subject matter experts in the management of e.pdfAs a member of a team of subject matter experts in the management of e.pdf
As a member of a team of subject matter experts in the management of e.pdf
 
An example of an epigenetic regulation of gene expression is HDACs- W.pdf
An example of an epigenetic regulation of gene expression is HDACs-  W.pdfAn example of an epigenetic regulation of gene expression is HDACs-  W.pdf
An example of an epigenetic regulation of gene expression is HDACs- W.pdf
 
An direct writing style is NOT used- Group of answer choices A-When.pdf
An direct writing style is NOT used-   Group of answer choices A-When.pdfAn direct writing style is NOT used-   Group of answer choices A-When.pdf
An direct writing style is NOT used- Group of answer choices A-When.pdf
 
An E- coll cell is infected by a temperate phage- Which of the followi.pdf
An E- coll cell is infected by a temperate phage- Which of the followi.pdfAn E- coll cell is infected by a temperate phage- Which of the followi.pdf
An E- coll cell is infected by a temperate phage- Which of the followi.pdf
 
An atom has a charge of +2- What does this mean about the relationship.pdf
An atom has a charge of +2- What does this mean about the relationship.pdfAn atom has a charge of +2- What does this mean about the relationship.pdf
An atom has a charge of +2- What does this mean about the relationship.pdf
 
Alisha is proud to be able to send her daughter to university- Her dau.pdf
Alisha is proud to be able to send her daughter to university- Her dau.pdfAlisha is proud to be able to send her daughter to university- Her dau.pdf
Alisha is proud to be able to send her daughter to university- Her dau.pdf
 
An actress has a probability of getting offered a job after a try-out.pdf
An actress has a probability of getting offered a job after a try-out.pdfAn actress has a probability of getting offered a job after a try-out.pdf
An actress has a probability of getting offered a job after a try-out.pdf
 
An adininistrator in the IT-HR department needs access to a virtual ma.pdf
An adininistrator in the IT-HR department needs access to a virtual ma.pdfAn adininistrator in the IT-HR department needs access to a virtual ma.pdf
An adininistrator in the IT-HR department needs access to a virtual ma.pdf
 
Age-specific mortality is defined as thenumber of individuals from the.pdf
Age-specific mortality is defined as thenumber of individuals from the.pdfAge-specific mortality is defined as thenumber of individuals from the.pdf
Age-specific mortality is defined as thenumber of individuals from the.pdf
 
Alter your Rectangle class to include compareTo and make any other mod.pdf
Alter your Rectangle class to include compareTo and make any other mod.pdfAlter your Rectangle class to include compareTo and make any other mod.pdf
Alter your Rectangle class to include compareTo and make any other mod.pdf
 

Recently uploaded

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

An attacker has sent an email where the victim navigates to a maliciou.pdf

  • 1. An attacker has sent an email where the victim navigates to a malicious web page that has been set up to look official. What is this called? Question options: Baiting Pharming Malvertising Phishing Spamming A security professional is checking for domains based on certificates that are no longer allowed. What could they check for this? Question options: SET ncpa.cpl CRL SAN CRT A security analyst is trying to find older versions of a company's website which contained sensitive information. They are worried that attackers might still be able to find older versions, so they want to try using web search commands. Which web search command would help them search? Question options: site :search cache inurl inanchor
  • 2. A penetration tester is working on a project and sees a fairly recent VoIP vulnerability has come out. Which of the following records would best help them narrow down potential targets? Question options: NS MX SOA SRV TXT A penetration tester is trying to use Google Hacking to find more instances of Cisco CallManager. What should they use? Question options: intitle:"DPH" "web login setting" intitle:"Grandstream Device Configuration" password inurl:"ccmuser/logon.asp" inurl:"CallManager" A team is conducting a physical assessment and uses a simple mechanism such as Styrofoam to bypass a certain control. Which control are they likely bypassing? Question options: Flood lights Security badges Locks Motion sensor Fences The Social Engineering Toolkit is being employed for a targeted attack towards personnel. Which of the following can SET NOT do?
  • 3. Question options: Reverse shells PowerShell attacks Scaling Mass mail attacks Infectious media A security professional is looking for an organization's code that might have been posted publicly by developers. Which of the following sources is least likely to contain accidental posts by a company's developers? Question options: Github CloudForge Red dit Bitbucker theWayBackMachine A social engineer is communicating, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood. What is this tactic called? Question options: Pharming Elicitation Hoax Phishing Pretexting A security professional is looking for interesting targets on a public-facing web server. What would show them areas of the server that are not supposed to be crawled?
  • 4. Question options: Subject alternative name Robots Revocation list DNS Secret A penetration tester is conducting a test against external-facing websites. Which of the following tools is specifically geared towards website enumeration? Question options: Nmap SET WIGLE dirbuster OpenVAS A penetration tester wants to gather email information for a targeted phishing campaign. Which of the following tools could they use to collect this? Question options: Shodan Metagoofil Dirbuster Nmap theHarvester During a penetration testing engagement, one of the team members presents a fictitious situation as real. What is this tactic called? Question options:
  • 5. Elicitation Phishing Hoax Pretexting A penetration tester is conducting an OSINT reconnaissance against key employees to try to find avenues into the network and notice that they belong to specific communities. Which of the following would MOST likely help them target these niche areas? Question options: Twitter Red dit LinkedIn Instagram Facebook Pintrest A security consultant is attempting to look for default passwords for a client's D-Link phones. Which of the following should they use? Question options: intitle:"DPH" "web login setting" intitle:"Grandstream Device Configuration" password D.inurl:"CallManager" inurl:"ccmuser/logon.asp" intitle:"*" default password Baiting Pharming Malvertising Phishing