Daily Multiple Choice Test

which output flag would be most effective for extracting information via the grep command?
-oG
-oN
-oL
-oX
-oG
to conduct a ping sweep which flag would be used
-sn
-sS
-sP
-sI
-sn
Which will take preventitive action upon known attack
IPS
Layer 3 router
IDS
HIDS
IPS
where can the nse scripts be found
tbd
tbd
In individual conducts an unauthorised scan of a website using a range of automated tools, one of which accidently damages the site's database. Which section of the Computer Misuse Act is most likely to apply?
3
2
1
none
3
A Domain Controller will usually have which ports open
TCP/88 , TCP/139 , TCP/389
TCP/80 , TCP/443
TCP/22 , TCP/9001
TCP/53 , TCP 445 , TCP 5800
TCP/88 , TCP/139 , TCP/389
If a compromised windows machine stores passwords in both LM and NTLM hashing formats, which would be better to crack
LM as passwords will have a maximum character length of 7
NTLM because the hashing algorithm is more efficient
LM because it uses the DES algorithm
NTLM because GPU cracking can be used
LM as passwords will have a maximum character length of 7
Can server responses be intercepted by BurpSuite
yes
no
Servers don’t give any response
BurpSuite doesn’t intercept anything
yes
Under CMA is it a crime to download the hacking tool metasploit
no
yes
yes because it can be used to attack a target
CMA does not restrict tools
no
When conducting an infrastructure assessment, what is typically the most highly valued target
Domain Controller
File Server
Web Server
Entity Server
Domain Controller
Your Score
Score Label
Score Summary